Cited By
View all- Karpati PRedda YOpdahl ASindre G(2014)Comparing attack trees and misuse cases in an industrial settingInformation and Software Technology10.1016/j.infsof.2013.10.00456:3(294-308)Online publication date: 1-Mar-2014
- Bedi PGandotra VSinghal ANarang HSharma S(2013)Mitigating multi-threats optimally in proactive threat managementACM SIGSOFT Software Engineering Notes10.1145/2413038.241304138:1(1-7)Online publication date: 23-Jan-2013
- Gandotra VArchana Singhal ABedi P(2011)Layered security architecture for threat management using multi-agent systemACM SIGSOFT Software Engineering Notes10.1145/2020976.202098436:5(1-11)Online publication date: 30-Sep-2011