


default search action
4th GraMSec@CSF 2017: Santa Barbara, CA, USA
- Peng Liu, Sjouke Mauw, Ketil Stølen:

Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10744, Springer 2018, ISBN 978-3-319-74859-7 - Dan Ionita

, Margaret Ford, Alexandr Vasenev, Roel J. Wieringa:
Graphical Modeling of Security Arguments: Current State and Future Directions. 1-16 - Angèle Bossuat, Barbara Kordy:

Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide. 17-37 - Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim

, Ørnulf Jan Rødseth
:
Visualizing Cyber Security Risks with Bow-Tie Diagrams. 38-56 - Aitor Couce Vieira

, Siv Hilde Houmb, David Ríos Insua
:
CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents. 57-74 - René Rydhof Hansen

, Peter Gjøl Jensen
, Kim Guldstrand Larsen
, Axel Legay, Danny Bøgsted Poulsen:
Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata. 75-90 - Brian E. Ruttenberg, Dave Blumstein, Jeff Druce, Michael Howard, Fred Reed, Leslie Wilfong, Crystal Lister, Steve Gaskin, Meaghan Foley, Daniel Scofield:

Probabilistic Modeling of Insider Threat Detection Systems. 91-98 - Letitia W. Li, Florian Lugou, Ludovic Apvrille:

Security Modeling for Embedded System Design. 99-106 - Ryan Habibi, Jens H. Weber, Morgan Price:

Circle of Health Based Access Control for Personal Health Information Systems. 107-114 - Olga Gadyatskaya, Rolando Trujillo-Rasua

:
New Directions in Attack Tree Research: Catching up with Industrial Needs. 115-126 - Ales Cernivec, Gencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Antonio Álvarez Romero:

Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. 127-146

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














