Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on the usability and practical applications of graphical security models
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
Beyond 2014: Formal Methods for Attack Tree--based Security Modeling
W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …
They provide a readable and structured representation of possible attacks against a system …
[HTML][HTML] Survey: Automatic generation of attack trees and attack graphs
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …
security of a system. These classes of models are used by security experts to identify …
ChatGPT knows your attacks: Synthesizing attack trees using LLMs
O Gadyatskaya, D Papuc - International Conference on Data Science and …, 2023 - Springer
Attack trees are a popular method to represent cyberattack scenarios. It is often challenging
for organizations to design attack trees for relevant systems and scenarios, as this requires …
for organizations to design attack trees for relevant systems and scenarios, as this requires …
On quantitative analysis of attack–defense trees with repeated labels
B Kordy, W Wideł - Principles of Security and Trust: 7th International …, 2018 - Springer
Ensuring security of complex systems is a difficult task that requires utilization of numerous
tools originating from various domains. Among those tools we find attack–defense trees, a …
tools originating from various domains. Among those tools we find attack–defense trees, a …
Is my attack tree correct?
M Audinot, S Pinchinat, B Kordy - … on Research in Computer Security, Oslo …, 2017 - Springer
Attack trees are a popular way to represent and evaluate potential security threats on
systems or infrastructures. The goal of this work is to provide a framework allowing to …
systems or infrastructures. The goal of this work is to provide a framework allowing to …
[HTML][HTML] Verdict: a language and framework for engineering cyber resilient and safe system
The ever-increasing complexity of cyber-physical systems is driving the need for assurance
of critical infrastructure and embedded systems. However, traditional methods to secure …
of critical infrastructure and embedded systems. However, traditional methods to secure …
[HTML][HTML] Formal template-based generation of attack–defence trees for automated security analysis
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS)
are becoming increasingly complex, but demonstrating the security of CPS is hard and …
are becoming increasingly complex, but demonstrating the security of CPS is hard and …
Quantitative security risk modeling and analysis with RisQFLan
Abstract Domain-specific quantitative modeling and analysis approaches are fundamental in
scenarios in which qualitative approaches are inappropriate or unfeasible. In this paper, we …
scenarios in which qualitative approaches are inappropriate or unfeasible. In this paper, we …
Refinement-aware generation of attack trees
Attack trees allow a security analyst to obtain an overview of the potential vulnerabilities of a
system. Due to their refinement structure, attack trees support the analyst in understanding …
system. Due to their refinement structure, attack trees support the analyst in understanding …