Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1303.7397
Cited By
DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees
29 March 2013
Barbara Kordy
L. Piètre-Cambacédès
P. Schweitzer
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees"
47 / 47 papers shown
Title
Attack-Defense Trees with Offensive and Defensive Attributes (with Appendix)
Danut-Valentin Copae
Reza Soltani
Milan Lopuhaä-Zwakenberg
AAML
48
0
0
17 Apr 2025
Safety and Security Risk Mitigation in Satellite Missions via Attack-Fault-Defense Trees
Reza Soltani
Pablo Diale
Milan Lopuhaä-Zwakenberg
Marielle Stoelinga
45
0
0
01 Apr 2025
Forecasting the risk of software choices: A model to foretell security vulnerabilities from library dependencies and source code evolution
C. E. Budde
Ranindya Paramitha
Fabio Massacci
64
0
0
17 Nov 2024
Towards the generation of hierarchical attack models from cybersecurity vulnerabilities using language models
Kacper Sowka
Vasile Palade
Xiaorui Jiang
Hesam Jadidbonab
87
1
0
07 Oct 2024
QuADTool: Attack-Defense-Tree Synthesis, Analysis and Bridge to Verification
Florian Dorfhuber
Julia Eisentraut
Katharina Klioba
Jan Křetínský
18
0
0
21 Jun 2024
Attack Tree Generation via Process Mining
A. Konsta
Gemma Di Federico
Alberto Lluch-Lafuente
Andrea Burattin
18
0
0
19 Feb 2024
On the complexity of sabotage games for network security
Dhananjay Raju
Georgios Bakirtzis
Ufuk Topcu
AAML
13
0
0
20 Dec 2023
Gotta Catch ém All: Aggregating CVSS Scores
Ángel Longueira-Romero
Jose Luis Flores
Rosa Iglesias
Iñaki Garitano
13
1
0
03 Oct 2023
Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment
Simon Unger
Ektor Arzoglou
Markus Heinrich
D. Scheuermann
Stefan Katzenbeisser
15
1
0
26 Jul 2023
Optimal Scheduling of Agents in ADTrees: Specialised Algorithm and Declarative Models
Jaime Arias
C. Olarte
L. Petrucci
Łukasz Maśko
W. Penczek
Teofil Sidoruk
16
0
0
08 May 2023
A Survey of Automatic Generation of Attack Trees and Attack Graphs
A. Konsta
Beatrice Spiga
Alberto Lluch-Lafuente
N. Dragoni
36
9
0
28 Feb 2023
Efficient and Generic Algorithms for Quantitative Attack Tree Analysis
Milan Lopuhaä-Zwakenberg
C. E. Budde
Marielle Stoelinga
19
15
0
10 Dec 2022
Partially-Observable Security Games for Automating Attack-Defense Analysis
Narges Khakpour
David Parker
AAML
17
0
0
02 Nov 2022
ThreatPro: Multi-Layer Threat Analysis in the Cloud
Salman Manzoor
Antonios Gouglidis
M. Bradbury
N. Suri
19
0
0
29 Sep 2022
Reasoning about Moving Target Defense in Attack Modeling Formalisms
Gabriel Ballot
Vadim Malvone
J. Leneutre
Etienne Borde
AAML
18
2
0
28 Jun 2022
Timed automata as a formalism for expressing security: A survey on theory and practice
Johan Arcile
Étienne André
AI4CE
22
12
0
07 Jun 2022
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool
Przemysław Buczkowski
P. Malacaria
C. Hankin
A. Fielder
34
5
0
25 Apr 2022
Attack time analysis in dynamic attack trees via integer linear programming
Milan Lopuhaä-Zwakenberg
Marielle Stoelinga
39
6
0
09 Nov 2021
A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version
N. D. Schiele
Olga Gadyatskaya
31
7
0
06 Oct 2021
A Survey on Trust Metrics for Autonomous Robotic Systems
Vincenzo DiLuoffo
W. Michalson
27
1
0
28 Jun 2021
Model-based Joint Analysis of Safety and Security: Survey and Identification of Gaps
Stefano M. Nicoletti
Marijn Peppelman
Christina Kolb
Marielle Stoelinga
22
7
0
11 Jun 2021
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security
Jacob Brown
Tanujay Saha
N. Jha
42
20
0
31 May 2021
Model-based Cybersecurity Analysis: Past Work and Future Directions
S. Y. Enoch
Mengmeng Ge
Jin B. Hong
Dong Seong Kim
47
2
0
18 May 2021
Efficient Algorithms for Quantitative Attack Tree Analysis
C. E. Budde
Marielle Stoelinga
23
9
0
16 May 2021
Quantitative Security Risk Modeling and Analysis with RisQFLan
Maurice H. ter Beek
Axel Legay
Alberto Lluch-Lafuente
Andrea Vandin
53
13
0
21 Jan 2021
Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees
Jaime Arias
Łukasz Maśko
W. Penczek
L. Petrucci
Teofil Sidoruk
AAML
19
2
0
18 Jan 2021
A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception
A. Kulkarni
Jie Fu
28
2
0
07 Aug 2020
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Isaac Matthews
John C. Mace
Sadegh Soudjani
Aad van Moorsel
AAML
16
10
0
13 May 2020
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties
T. Kieras
Muhammad Junaid Farooq
Quanyan Zhu
6
6
0
20 Mar 2020
RIoTS: Risk Analysis of IoT Supply Chain Threats
T. Kieras
Muhammad Junaid Farooq
Quanyan Zhu
28
12
0
28 Nov 2019
Extending Causal Models from Machines into Humans
Severin Kacianka
Amjad Ibrahim
A. Pretschner
Alexander Trende
A. Lüdtke
26
9
0
31 Oct 2019
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks
Devon Callahan
Timothy Curry
Hazel Davidson
Heytem Zitoun
Benjamin Fuller
L. Michel
32
2
0
17 Oct 2019
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems
Jaime Arias
C. E. Budde
W. Penczek
L. Petrucci
Marielle Stoelinga
31
14
0
12 Jun 2019
An Automated Security Analysis Framework and Implementation for Cloud
Hootan Alavizadeh
Hooman Alavizadeh
Dong Seong Kim
Julian Jang
Masood Niazi Torshiz
29
4
0
03 Apr 2019
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing
SeoungMo An
Taehoon Eom
Jong Sou Park
Jin B. Hong
A. Nhlabatsi
Noora Fetais
K. Khan
Dong Seong Kim
19
15
0
11 Mar 2019
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs
Ali Behfarnia
A. Eslami
AAML
10
12
0
05 Mar 2019
Parametric analyses of attack-fault trees
Étienne André
D. Lime
Mathias Ramparison
Marielle Stoelinga
39
21
0
12 Feb 2019
Attribute Evaluation on Attack Trees with Incomplete Information
A. Buldas
Olga Gadyatskaya
A. Lenin
S. Mauw
Rolando Trujillo-Rasua
AAML
13
25
0
27 Dec 2018
Attack Trees in Isabelle
Florian Kammuller
11
13
0
17 Mar 2018
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
Patrick Luckett
J. McDonald
W. Glisson
26
24
0
15 Sep 2017
Is my attack tree correct? Extended version
Maxime Audinot
S. Pinchinat
Barbara Kordy
21
37
0
26 Jun 2017
Discovering, quantifying, and displaying attacks
R. Vigo
F. Nielson
H. R. Nielson
44
4
0
26 Jul 2016
Bayesian Attack Model for Dynamic Risk Assessment
François-Xavier Aguessy
Olivier Bettan
Grégory Blanc
V. Conan
Hervé Debar
AAML
35
7
0
29 Jun 2016
Time Dependent Analysis with Dynamic Counter Measure Trees
Rajesh Kumar
Dennis Guck
Marielle Stoelinga
18
8
0
30 Sep 2015
Attack Trees with Sequential Conjunction
Ravi Jhawar
Barbara Kordy
S. Mauw
S. Radomirovic
Rolando Trujillo-Rasua
28
93
0
08 Mar 2015
Automatic Generation of Security Argument Graphs
Nils Ole Tippenhauer
W. G. Temple
A. Vu
Binbin Chen
D. Nicol
Zbigniew T. Kalbarczyk
W. Sanders
40
19
0
29 May 2014
Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study
S. Paul
66
26
0
08 Apr 2014
1