Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 235,006,848 papers from all fields of science
Search
Sign In
Create Free Account
Attack tree
Attack trees are conceptual diagrams showing how an asset, or target, might be attacked. Attack trees have been used in a variety of applications. In…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Attack (computing)
Computer security
Computer virus
Exploit (computer security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Wood degradation after windthrow in a northern environment
Jean-Claude Ruel
,
A. Achim
,
R. Herrera
,
A. Cloutier
,
B. Brossier
2010
Corpus ID: 54692331
Severe windthrows often require salvage operations that can lead to increased costs. Given these extra costs, it is of paramount…
Expand
2010
2010
Attack and defense dynamic modeling with BDMP - Extended version Modélisation dynamique d'attaques et de défenses avec les BDMP - Version longue
Ludovic Pietre-Cambacedes
,
M. Bouissou
2010
Corpus ID: 46496692
The BDMP (Boolean logic Driven Markov Processes) modeling formalism has recently been adapted from reliability engineering to…
Expand
2008
2008
Estimating Cavity Tree Abundance Using Nearest Neighbor Imputation Methods for Western Oregon and Washington Forests
H. Temesgen
,
T. Barrett
,
Greg Latta
2008
Corpus ID: 53982429
Cavity trees contribute to diverse forest structure and wildlife habitat. For a given stand, the size and density of cavity trees…
Expand
2008
2008
Effect of Biostimulants, Ethrel, Boron and Potassium Nutrient on Fruit Quality of "Costata" Persimmon
A. El-fatah
,
S. A. Mohamed
,
O. Ismail
2008
Corpus ID: 4991423
2 Abstract: This study was carried out during the two seasons 2006, 2007 on persimmon trees Costata cv., the trees were 16 years…
Expand
2007
2007
Investigating Computer Attacks Using Attack Trees
Nayot Poolsapassit
,
I. Ray
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 9087675
System log files contain valuable evidence pertaining to computer attacks. However, the log files are often massive, and much of…
Expand
2005
2005
Mäori cultural regeneration: Püräkau as pedagogy
J. Lee
2005
Corpus ID: 155446099
2005
2005
The life-span of leadwood trees
J. Vogel
,
A. Fuls
2005
Corpus ID: 88598972
Radiocarbon analyses on 16 specimens of the leadwood tree, Combretum imberbe, showed that they live for several hundred years…
Expand
Review
2004
Review
2004
The History of Human Impact on the Genus Santalum in Hawai‘i
M. Merlin
,
Dan VanRavenswaay
2004
Corpus ID: 17055478
Adaptive radiation of Santalum in the Hawaiian archipelago has provided these remote islands with a number of endemic species and…
Expand
2001
2001
Influence of broadleaf trees on soil chemical properties: A retrospective study in the Sub-Boreal Spruce Zone, British Columbia, Canada
P. Sanborn
Plant and Soil
2001
Corpus ID: 5550839
A retrospective study examined the influence of broadleaf trees, principally paper birch (Betula papyrifera Marsh.), on soil…
Expand
1992
1992
Production potential of Fuerte on seedling rootstocks
D. Smith
,
J. Köhne
1992
Corpus ID: 67780446
All Fuerte trees on Westfalia were rated on a scale of A to E in terms of fruit density, A being a top producer and E being a…
Expand