


default search action
2nd GraMSec@CSF 2015: Verona, Italy
- Sjouke Mauw
, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 - Christian W. Probst
, Jan Willemson, Wolter Pieters:
The Attack Navigator. 1-17 - Volker Ahlers
, Felix Heine
, Bastian Hellmann, Carsten Kleiner
, Leonard Renners, Thomas Rossow, Ralf Steuerwald:
Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources. 18-34 - Ludovic Apvrille, Yves Roudier:
SysML-Sec Attack Graphs: Compact Representations for Complex Attacks. 35-49 - Olga Gadyatskaya:
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. 50-65 - Laurent Cuennet, Marc Pouly
, Sasa Radomirovic
:
Guided Specification and Analysis of a Loyalty Card System. 66-81 - Marieta Georgieva Ivanova, Christian W. Probst
, René Rydhof Hansen
, Florian Kammüller:
Transforming Graphical System Models to Graphical Attack Models. 82-96 - Sophie Pinchinat, Mathieu Acher, Didier Vojtisek:
ATSyRa: An Integrated Environment for Synthesizing Attack Trees - (Tool Paper). 97-101

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.