Attack tree

Attack trees are conceptual diagrams showing how an asset, or target, might be attacked. Attack trees have been used in a variety of applications. In… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2018
0102020002018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating… (More)
  • figure 1
  • figure 6
Is this relevant?
2012
2012
Attack tree (AT) is one of the widely used non-state-space models for security analysis. The basic formalism of AT does not take… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
Is this relevant?
2010
2010
In this paper we address the problem of inefficiency of exact attack tree computations. We propose several implementation-level… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2009
2009
In this paper we extend the standard attack tree model by introducing temporal order to the attacker’s decision making process… (More)
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively… (More)
  • table 2
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
In recent years, attack trees have been developed to describe processes by which malicious users attempt to exploit or break… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Attack trees have found their way to practice because they have proved to be an intuitive aid in threat analysis. Despite, or… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Protocol standards, particularly those for critical control systems in the petroleum and power industry, have traditionally been… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Even well administered networks are vulnerable to attack. Recent work in network security has focused on the fact that… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
T h e m o d e l i n g o f pe ne t r a t i on tes t ing as a Petr i ne t is su rp r i s ing ly usefu l . I t re ta ins key a d v a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?