


default search action
7th GraMSec@CSF 2020: Boston, MA, USA
- Harley Eades III
, Olga Gadyatskaya
:
Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers. Lecture Notes in Computer Science 12419, Springer 2020, ISBN 978-3-030-62229-9
Attack Trees
- Amjad Ibrahim, Simon Rehwald, Antoine Scemama, Florian Andres, Alexander Pretschner:
Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks. 3-23 - Sophie Pinchinat, François Schwarzentruber, Sébastien Lê Cong:
Library-Based Attack Tree Synthesis. 24-44 - Christopher Schmitz, André Sekulla, Sebastian Pape:
Asset-Centric Analysis and Visualisation of Attack Trees. 45-64
Attacks and Risks Modelling and Visualisation
- Sotirios Katsikeas
, Simon Hacks
, Pontus Johnson
, Mathias Ekstedt
, Robert Lagerström
, Joar Jacobsson, Max Wällstedt, Per Eliasson:
An Attack Simulation Language for the IT Domain. 67-86 - Adam Szekeres
, Einar Snekkenes:
Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer. 87-110 - Kristian Haga
, Per Håkon Meland
, Guttorm Sindre
:
Breaking the Cyber Kill Chain by Modelling Resource Costs. 111-126 - Jean-François Lalande
, Mathieu Simon, Valérie Viet Triem Tong:
GroDDViewer: Dynamic Dual View of Android Malware. 127-139
Models for Reasoning About Security
- Dov M. Gabbay, Ross Horne
, Sjouke Mauw, Leendert van der Torre
:
Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. 143-165 - Peter M. Hines:
A Diagrammatic Approach to Information Flow in Encrypted Communication. 166-185 - Shamal Faily
, Riccardo Scandariato, Adam Shostack, Laurens Sion
, Duncan Ki-Aries
:
Contextualisation of Data Flow Diagrams for Security Analysis. 186-197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.