


default search action
1st GraMSec 2014: Grenoble, France
- Barbara Kordy, Sjouke Mauw
, Wolter Pieters:
Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014. EPTCS 148, 2014 - Erlend Andreas Gjære, Per Håkon Meland:
Threats Management Throughout the Software Service Life-Cycle. 1-14 - Ludovic Apvrille, Yves Roudier:
Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems. 15-30 - Stéphane Paul:
Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study. 31-46 - Thomas Bauereiß, Dieter Hutter
:
Possibilistic Information Flow Control for Workflow Management Systems. 47-62 - Cristian Prisacariu
:
Actor Network Procedures as Psi-calculi for Security Ceremonies. 63-77 - Aitor Couce Vieira
, Siv Hilde Houmb, David Ríos Insua:
A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity. 78-93

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.