Search dblp for Publications

export results for "toc:db/conf/csfw/gramsec2015.bht:"

 download as .bib file

@proceedings{DBLP:conf/csfw/2015gramsec,
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29968-6},
  doi          = {10.1007/978-3-319-29968-6},
  isbn         = {978-3-319-29967-9},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2015gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AhlersHHKRRS15,
  author       = {Volker Ahlers and
                  Felix Heine and
                  Bastian Hellmann and
                  Carsten Kleiner and
                  Leonard Renners and
                  Thomas Rossow and
                  Ralf Steuerwald},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Integrated Visualization of Network Security Metadata from Heterogeneous
                  Data Sources},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_2},
  doi          = {10.1007/978-3-319-29968-6\_2},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/AhlersHHKRRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ApvrilleR15,
  author       = {Ludovic Apvrille and
                  Yves Roudier},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {SysML-Sec Attack Graphs: Compact Representations for Complex Attacks},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_3},
  doi          = {10.1007/978-3-319-29968-6\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ApvrilleR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuennetPR15,
  author       = {Laurent Cuennet and
                  Marc Pouly and
                  Sasa Radomirovic},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Guided Specification and Analysis of a Loyalty Card System},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_5},
  doi          = {10.1007/978-3-319-29968-6\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CuennetPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Gadyatskaya15,
  author       = {Olga Gadyatskaya},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {How to Generate Security Cameras: Towards Defence Generation for Socio-Technical
                  Systems},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {50--65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_4},
  doi          = {10.1007/978-3-319-29968-6\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Gadyatskaya15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Transforming Graphical System Models to Graphical Attack Models},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_6},
  doi          = {10.1007/978-3-319-29968-6\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PinchinatAV15,
  author       = {Sophie Pinchinat and
                  Mathieu Acher and
                  Didier Vojtisek},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {ATSyRa: An Integrated Environment for Synthesizing Attack Trees -
                  (Tool Paper)},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {97--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_7},
  doi          = {10.1007/978-3-319-29968-6\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/PinchinatAV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ProbstWP15,
  author       = {Christian W. Probst and
                  Jan Willemson and
                  Wolter Pieters},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {The Attack Navigator},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_1},
  doi          = {10.1007/978-3-319-29968-6\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ProbstWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}