The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "GraMSec@CSF"( http://dblp.L3S.de/Venues/GraMSec@CSF )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csfw

Publication years (Num. hits)
2015-2016 (19) 2017-2019 (22) 2020 (11)
Publication types (Num. hits)
inproceedings(47) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 52 publication records. Showing 52 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Christopher Schmitz, André Sekulla, Sebastian Pape 0001 Asset-Centric Analysis and Visualisation of Attack Trees. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Adam Szekeres, Einar Snekkenes Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dov M. Gabbay, Ross Horne, Sjouke Mauw, Leendert van der Torre Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sophie Pinchinat, François Schwarzentruber, Sébastien Lê Cong Library-Based Attack Tree Synthesis. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jean-François Lalande, Mathieu Simon, Valérie Viet Triem Tong GroDDViewer: Dynamic Dual View of Android Malware. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amjad Ibrahim, Simon Rehwald, Antoine Scemama, Florian Andres, Alexander Pretschner Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Harley Eades III, Olga Gadyatskaya (eds.) Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt, Per Eliasson An Attack Simulation Language for the IT Domain. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kristian Haga, Per Håkon Meland, Guttorm Sindre Breaking the Cyber Kill Chain by Modelling Resource Costs. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries Contextualisation of Data Flow Diagrams for Security Analysis. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Peter M. Hines A Diagrammatic Approach to Information Flow in Encrypted Communication. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Barbara Fila, Wojciech Widel Attack-Defense Trees for Abusing Optical Power Meters: A Case Study and the OSEAD Tool Experience Report. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sophie Pinchinat, Barbara Fila, Florence Wacheux, Yann Thierry-Mieg Attack Trees: A Notion of Missing Attacks. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xinyue Mao, Mathias Ekstedt, Engla Ling, Erik Ringdahl, Robert Lagerström Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sahar Berro, Ludovic Apvrille, Guillaume Duc Optimizing System Architecture Cost and Security Countermeasures. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Massimiliano Albanese, Ross Horne, Christian W. Probst (eds.) Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gaute Wangen Quantifying and Analyzing Information Security Risk from Incident Data. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Delphine Beaulaton, Najah Ben Said, Ioana Cristescu, Salah Sadou Security Analysis of IoT Systems Using Attack Trees. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stéphane Paul, Paul Varela Poster Support for an Obeya-Like Risk Management Approach. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya, Sjouke Mauw Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1George Cybenko Graph Models in Tracking Behaviors for Cyber-Security. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fabio Persia, Sven Helmer High-Level Automatic Event Detection and User Classification in a Social Network Context. Search on Bibsonomy GraMSec@CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Peng Liu 0004, Sjouke Mauw, Ketil Stølen (eds.) Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers Search on Bibsonomy GraMSec@CSF The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aitor Couce Vieira, Siv Hilde Houmb, David Ríos Insua CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Brian E. Ruttenberg, Dave Blumstein, Jeff Druce, Michael Howard, Fred Reed, Leslie Wilfong, Crystal Lister, Steve Gaskin, Meaghan Foley, Daniel Scofield Probabilistic Modeling of Insider Threat Detection Systems. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Angèle Bossuat, Barbara Kordy Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya, Rolando Trujillo-Rasua New Directions in Attack Tree Research: Catching up with Industrial Needs. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ales Cernivec, Gencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Antonio Álvarez Romero Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, Ørnulf Jan Rødseth Visualizing Cyber Security Risks with Bow-Tie Diagrams. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Letitia W. Li, Florian Lugou, Ludovic Apvrille Security Modeling for Embedded System Design. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1René Rydhof Hansen, Peter Gjøl Jensen, Kim Guldstrand Larsen, Axel Legay, Danny Bøgsted Poulsen Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dan Ionita, Margaret Ford, Alexandr Vasenev, Roel J. Wieringa Graphical Modeling of Security Arguments: Current State and Future Directions. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryan Habibi, Jens H. Weber, Morgan Price Circle of Health Based Access Control for Personal Health Information Systems. Search on Bibsonomy GraMSec@CSF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Barbara Kordy, Mathias Ekstedt, Dong Seong Kim 0001 (eds.) Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eric Li, Jeroen Barendse, Frederic Brodbeck, Axel Tanner From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li, Kishor S. Trivedi Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paul D. Rowe Confining Adversary Actions via Measurement. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sjouke Mauw, Barbara Kordy, Sushil Jajodia (eds.) Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nihal Pekergin, Sovanna Tan, Jean-Michel Fourneau Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marlon Dumas, Luciano García-Bañuelos, Peeter Laud Differential Privacy Analysis of Data Processing Workflows. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Henk Jonkers, Dick A. C. Quartel Enterprise Architecture-Based Risk and Security Modelling and Analysis. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maxime Audinot, Sophie Pinchinat On the Soundness of Attack Trees. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen 0001, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xinming Ou A Bottom-Up Approach to Applying Graphical Models in Security Analysis. Search on Bibsonomy GraMSec@CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sophie Pinchinat, Mathieu Acher, Didier Vojtisek ATSyRa: An Integrated Environment for Synthesizing Attack Trees - (Tool Paper). Search on Bibsonomy GraMSec@CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow, Ralf Steuerwald Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources. Search on Bibsonomy GraMSec@CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ludovic Apvrille, Yves Roudier SysML-Sec Attack Graphs: Compact Representations for Complex Attacks. Search on Bibsonomy GraMSec@CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. Search on Bibsonomy GraMSec@CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Laurent Cuennet, Marc Pouly, Sasa Radomirovic Guided Specification and Analysis of a Loyalty Card System. Search on Bibsonomy GraMSec@CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian W. Probst, Jan Willemson, Wolter Pieters The Attack Navigator. Search on Bibsonomy GraMSec@CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller Transforming Graphical System Models to Graphical Attack Models. Search on Bibsonomy GraMSec@CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #52 of 52 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license