Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis

J Bryans, LS Liew, HN Nguyen, G Sabaliauskaite… - information, 2023 - mdpi.com
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS)
are becoming increasingly complex, but demonstrating the security of CPS is hard and …

Tamper-tolerant diagnosability analysis and tampering detectability in discrete event systems under cost constraints

Y Li, CN Hadjicostis, N Wu, Z Li - Automatica, 2025 - Elsevier
This paper addresses fault diagnosis and tampering detection in discrete event systems
modeled with nondeterministic finite automata under malicious attacks. We propose a novel …

Cyber Attack Modeling Recent Approaches: A Review

Neha, A Maurya - Proceedings of Third International Conference on …, 2022 - Springer
The advancement in cyber technology has enhanced user convenience tremendously
hence accelerated its uses. But at the same time, cyber frauds, threats, and attacks have …

[PDF][PDF] Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis. Information 2023, 14, 481

J Bryans, LS Liew, HN Nguyen, G Sabaliauskaite… - 2023 - academia.edu
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS)
are becoming increasingly complex, but demonstrating the security of CPS is hard and …