default search action
Search dblp for Publications
export results for "toc:db/conf/csfw/gramsec2015.bht:"
@proceedings{DBLP:conf/csfw/2015gramsec, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29968-6}, doi = {10.1007/978-3-319-29968-6}, isbn = {978-3-319-29967-9}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2015gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AhlersHHKRRS15, author = {Volker Ahlers and Felix Heine and Bastian Hellmann and Carsten Kleiner and Leonard Renners and Thomas Rossow and Ralf Steuerwald}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {18--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_2}, doi = {10.1007/978-3-319-29968-6\_2}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/AhlersHHKRRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ApvrilleR15, author = {Ludovic Apvrille and Yves Roudier}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {SysML-Sec Attack Graphs: Compact Representations for Complex Attacks}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {35--49}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_3}, doi = {10.1007/978-3-319-29968-6\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ApvrilleR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuennetPR15, author = {Laurent Cuennet and Marc Pouly and Sasa Radomirovic}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Guided Specification and Analysis of a Loyalty Card System}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {66--81}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_5}, doi = {10.1007/978-3-319-29968-6\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CuennetPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Gadyatskaya15, author = {Olga Gadyatskaya}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {50--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_4}, doi = {10.1007/978-3-319-29968-6\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Gadyatskaya15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Transforming Graphical System Models to Graphical Attack Models}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {82--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_6}, doi = {10.1007/978-3-319-29968-6\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PinchinatAV15, author = {Sophie Pinchinat and Mathieu Acher and Didier Vojtisek}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {ATSyRa: An Integrated Environment for Synthesizing Attack Trees - (Tool Paper)}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {97--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_7}, doi = {10.1007/978-3-319-29968-6\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/PinchinatAV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ProbstWP15, author = {Christian W. Probst and Jan Willemson and Wolter Pieters}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {The Attack Navigator}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {1--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_1}, doi = {10.1007/978-3-319-29968-6\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ProbstWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.