ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1303.7397
  4. Cited By
DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the
  Attack Trees

DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees

29 March 2013
Barbara Kordy
L. Piètre-Cambacédès
P. Schweitzer
ArXiv (abs)PDFHTML

Papers citing "DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees"

47 / 47 papers shown
Title
Attack-Defense Trees with Offensive and Defensive Attributes (with Appendix)
Attack-Defense Trees with Offensive and Defensive Attributes (with Appendix)
Danut-Valentin Copae
Reza Soltani
Milan Lopuhaä-Zwakenberg
AAML
48
0
0
17 Apr 2025
Safety and Security Risk Mitigation in Satellite Missions via Attack-Fault-Defense Trees
Safety and Security Risk Mitigation in Satellite Missions via Attack-Fault-Defense Trees
Reza Soltani
Pablo Diale
Milan Lopuhaä-Zwakenberg
Marielle Stoelinga
45
0
0
01 Apr 2025
Forecasting the risk of software choices: A model to foretell security vulnerabilities from library dependencies and source code evolution
C. E. Budde
Ranindya Paramitha
Fabio Massacci
64
0
0
17 Nov 2024
Towards the generation of hierarchical attack models from cybersecurity
  vulnerabilities using language models
Towards the generation of hierarchical attack models from cybersecurity vulnerabilities using language models
Kacper Sowka
Vasile Palade
Xiaorui Jiang
Hesam Jadidbonab
87
1
0
07 Oct 2024
QuADTool: Attack-Defense-Tree Synthesis, Analysis and Bridge to
  Verification
QuADTool: Attack-Defense-Tree Synthesis, Analysis and Bridge to Verification
Florian Dorfhuber
Julia Eisentraut
Katharina Klioba
Jan Křetínský
18
0
0
21 Jun 2024
Attack Tree Generation via Process Mining
Attack Tree Generation via Process Mining
A. Konsta
Gemma Di Federico
Alberto Lluch-Lafuente
Andrea Burattin
18
0
0
19 Feb 2024
On the complexity of sabotage games for network security
On the complexity of sabotage games for network security
Dhananjay Raju
Georgios Bakirtzis
Ufuk Topcu
AAML
13
0
0
20 Dec 2023
Gotta Catch ém All: Aggregating CVSS Scores
Gotta Catch ém All: Aggregating CVSS Scores
Ángel Longueira-Romero
Jose Luis Flores
Rosa Iglesias
Iñaki Garitano
13
1
0
03 Oct 2023
Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment
Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment
Simon Unger
Ektor Arzoglou
Markus Heinrich
D. Scheuermann
Stefan Katzenbeisser
15
1
0
26 Jul 2023
Optimal Scheduling of Agents in ADTrees: Specialised Algorithm and
  Declarative Models
Optimal Scheduling of Agents in ADTrees: Specialised Algorithm and Declarative Models
Jaime Arias
C. Olarte
L. Petrucci
Łukasz Maśko
W. Penczek
Teofil Sidoruk
16
0
0
08 May 2023
A Survey of Automatic Generation of Attack Trees and Attack Graphs
A Survey of Automatic Generation of Attack Trees and Attack Graphs
A. Konsta
Beatrice Spiga
Alberto Lluch-Lafuente
N. Dragoni
36
9
0
28 Feb 2023
Efficient and Generic Algorithms for Quantitative Attack Tree Analysis
Efficient and Generic Algorithms for Quantitative Attack Tree Analysis
Milan Lopuhaä-Zwakenberg
C. E. Budde
Marielle Stoelinga
19
15
0
10 Dec 2022
Partially-Observable Security Games for Automating Attack-Defense
  Analysis
Partially-Observable Security Games for Automating Attack-Defense Analysis
Narges Khakpour
David Parker
AAML
17
0
0
02 Nov 2022
ThreatPro: Multi-Layer Threat Analysis in the Cloud
ThreatPro: Multi-Layer Threat Analysis in the Cloud
Salman Manzoor
Antonios Gouglidis
M. Bradbury
N. Suri
19
0
0
29 Sep 2022
Reasoning about Moving Target Defense in Attack Modeling Formalisms
Reasoning about Moving Target Defense in Attack Modeling Formalisms
Gabriel Ballot
Vadim Malvone
J. Leneutre
Etienne Borde
AAML
18
2
0
28 Jun 2022
Timed automata as a formalism for expressing security: A survey on
  theory and practice
Timed automata as a formalism for expressing security: A survey on theory and practice
Johan Arcile
Étienne André
AI4CE
22
12
0
07 Jun 2022
Optimal security hardening over a probabilistic attack graph: a case
  study of an industrial control system using the CySecTool tool
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool
Przemysław Buczkowski
P. Malacaria
C. Hankin
A. Fielder
34
5
0
25 Apr 2022
Attack time analysis in dynamic attack trees via integer linear
  programming
Attack time analysis in dynamic attack trees via integer linear programming
Milan Lopuhaä-Zwakenberg
Marielle Stoelinga
39
6
0
09 Nov 2021
A Novel Approach for Attack Tree to Attack Graph Transformation:
  Extended Version
A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version
N. D. Schiele
Olga Gadyatskaya
31
7
0
06 Oct 2021
A Survey on Trust Metrics for Autonomous Robotic Systems
A Survey on Trust Metrics for Autonomous Robotic Systems
Vincenzo DiLuoffo
W. Michalson
27
1
0
28 Jun 2021
Model-based Joint Analysis of Safety and Security: Survey and
  Identification of Gaps
Model-based Joint Analysis of Safety and Security: Survey and Identification of Gaps
Stefano M. Nicoletti
Marijn Peppelman
Christina Kolb
Marielle Stoelinga
22
7
0
11 Jun 2021
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things
  Aggregate Security
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security
Jacob Brown
Tanujay Saha
N. Jha
42
20
0
31 May 2021
Model-based Cybersecurity Analysis: Past Work and Future Directions
Model-based Cybersecurity Analysis: Past Work and Future Directions
S. Y. Enoch
Mengmeng Ge
Jin B. Hong
Dong Seong Kim
47
2
0
18 May 2021
Efficient Algorithms for Quantitative Attack Tree Analysis
Efficient Algorithms for Quantitative Attack Tree Analysis
C. E. Budde
Marielle Stoelinga
23
9
0
16 May 2021
Quantitative Security Risk Modeling and Analysis with RisQFLan
Quantitative Security Risk Modeling and Analysis with RisQFLan
Maurice H. ter Beek
Axel Legay
Alberto Lluch-Lafuente
Andrea Vandin
53
13
0
21 Jan 2021
Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees
Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees
Jaime Arias
Łukasz Maśko
W. Penczek
L. Petrucci
Teofil Sidoruk
AAML
19
2
0
18 Jan 2021
A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense
  with Deception
A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception
A. Kulkarni
Jie Fu
28
2
0
07 Aug 2020
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Isaac Matthews
John C. Mace
Sadegh Soudjani
Aad van Moorsel
AAML
16
10
0
13 May 2020
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of
  Structural and Parametric Uncertainties
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties
T. Kieras
Muhammad Junaid Farooq
Quanyan Zhu
6
6
0
20 Mar 2020
RIoTS: Risk Analysis of IoT Supply Chain Threats
RIoTS: Risk Analysis of IoT Supply Chain Threats
T. Kieras
Muhammad Junaid Farooq
Quanyan Zhu
28
12
0
28 Nov 2019
Extending Causal Models from Machines into Humans
Extending Causal Models from Machines into Humans
Severin Kacianka
Amjad Ibrahim
A. Pretschner
Alexander Trende
A. Lüdtke
26
9
0
31 Oct 2019
FASHION: Functional and Attack graph Secured HybrId Optimization of
  virtualized Networks
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks
Devon Callahan
Timothy Curry
Hazel Davidson
Heytem Zitoun
Benjamin Fuller
L. Michel
32
2
0
17 Oct 2019
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent
  Systems
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems
Jaime Arias
C. E. Budde
W. Penczek
L. Petrucci
Marielle Stoelinga
31
14
0
12 Jun 2019
An Automated Security Analysis Framework and Implementation for Cloud
An Automated Security Analysis Framework and Implementation for Cloud
Hootan Alavizadeh
Hooman Alavizadeh
Dong Seong Kim
Julian Jang
Masood Niazi Torshiz
29
4
0
03 Apr 2019
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing
SeoungMo An
Taehoon Eom
Jong Sou Park
Jin B. Hong
A. Nhlabatsi
Noora Fetais
K. Khan
Dong Seong Kim
19
15
0
11 Mar 2019
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs
Ali Behfarnia
A. Eslami
AAML
10
12
0
05 Mar 2019
Parametric analyses of attack-fault trees
Parametric analyses of attack-fault trees
Étienne André
D. Lime
Mathias Ramparison
Marielle Stoelinga
39
21
0
12 Feb 2019
Attribute Evaluation on Attack Trees with Incomplete Information
Attribute Evaluation on Attack Trees with Incomplete Information
A. Buldas
Olga Gadyatskaya
A. Lenin
S. Mauw
Rolando Trujillo-Rasua
AAML
13
25
0
27 Dec 2018
Attack Trees in Isabelle
Attack Trees in Isabelle
Florian Kammuller
11
13
0
17 Mar 2018
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
Patrick Luckett
J. McDonald
W. Glisson
26
24
0
15 Sep 2017
Is my attack tree correct? Extended version
Is my attack tree correct? Extended version
Maxime Audinot
S. Pinchinat
Barbara Kordy
21
37
0
26 Jun 2017
Discovering, quantifying, and displaying attacks
Discovering, quantifying, and displaying attacks
R. Vigo
F. Nielson
H. R. Nielson
44
4
0
26 Jul 2016
Bayesian Attack Model for Dynamic Risk Assessment
Bayesian Attack Model for Dynamic Risk Assessment
François-Xavier Aguessy
Olivier Bettan
Grégory Blanc
V. Conan
Hervé Debar
AAML
35
7
0
29 Jun 2016
Time Dependent Analysis with Dynamic Counter Measure Trees
Time Dependent Analysis with Dynamic Counter Measure Trees
Rajesh Kumar
Dennis Guck
Marielle Stoelinga
18
8
0
30 Sep 2015
Attack Trees with Sequential Conjunction
Attack Trees with Sequential Conjunction
Ravi Jhawar
Barbara Kordy
S. Mauw
S. Radomirovic
Rolando Trujillo-Rasua
28
93
0
08 Mar 2015
Automatic Generation of Security Argument Graphs
Automatic Generation of Security Argument Graphs
Nils Ole Tippenhauer
W. G. Temple
A. Vu
Binbin Chen
D. Nicol
Zbigniew T. Kalbarczyk
W. Sanders
40
19
0
29 May 2014
Towards Automating the Construction & Maintenance of Attack Trees: a
  Feasibility Study
Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study
S. Paul
66
26
0
08 Apr 2014
1