Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
83
views
26
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,886
similar
All similar
Record
: found
Abstract
: found
Book Chapter
: found
Is Open Access
Fundamental Approaches to Software Engineering
Effective Analysis of Attack Trees: A Model-Driven Approach
other
Author(s):
Rajesh Kumar
,
Stefano Schivo
,
Enno Ruijters
,
Buǧra Mehmet Yildiz
,
David Huistra
,
Jacco Brandt
,
Arend Rensink
,
Mariëlle Stoelinga
Publication date
(Online):
April 04 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Download
XML
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Core Readings in Statistical Mediation Analysis
Most cited references
26
Record
: found
Abstract
: not found
Article
: not found
Guest Editor's Introduction: Model-Driven Engineering
D.C. Schmidt
(2006)
0
comments
Cited
105
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
DAG-based attack and defense modeling: Don’t miss the forest for the attack trees
Barbara Kordy
,
Ludovic Piètre-Cambacédès
,
Patrick Schweitzer
(2014)
0
comments
Cited
29
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Storm is Coming: A Modern Probabilistic Model Checker
Christian Dehnert
,
Sebastian Junges
,
Joost-Pieter Katoen
…
(2017)
0
comments
Cited
28
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
April 04 2018
Pages
: 56-73
DOI:
10.1007/978-3-319-89363-1_4
SO-VID:
96bc955b-caf6-46b0-be78-c6c7ece39e3f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
A Formal Framework for Incremental Model Slicing
pp. 21
Multiple Model Synchronization with Multiary Delta Lenses
pp. 38
Controlling the Attack Surface of Object-Oriented Refactorings
pp. 56
Effective Analysis of Attack Trees: A Model-Driven Approach
pp. 77
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis
pp. 94
A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism
pp. 111
Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems
pp. 129
EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States
pp. 149
Hierarchical Specification and Verification of Architectural Design Patterns
pp. 169
Supporting Verification-Driven Incremental Distributed Design of Components
pp. 189
Summarizing Software API Usage Examples Using Clustering Techniques
pp. 207
Fast Computation of Arbitrary Control Dependencies
pp. 227
Iterative Generation of Diverse Models for Testing Specifications of DSL Tools
pp. 246
Optimising Spectrum Based Fault Localisation for Single Fault Programs Using Specifications
pp. 264
TCM: Test Case Mutation to Improve Crash Detection in Android
pp. 281
CRETE: A Versatile Binary-Level Concolic Testing Framework
pp. 301
Abstract Family-Based Model Checking Using Modal Featured Transition Systems: Preservation of CTL$$^{\star }$$⋆
pp. 319
FPH: Efficient Non-commutativity Analysis of Feature-Based Systems
pp. 337
Taming Multi-Variability of Software Product Line Transformations
Similar content
3,886
Light induces an increasing release of benzyl nitrile against diurnal herbivore Ectropis grisescens Warren attack in tea (Camellia sinensis) plants.
Authors:
Jiajia Qian
,
Yinyin Liao
,
Guotai Jian
…
Defending Substitution-Based Profile Pollution Attacks on Sequential Recommenders
Authors:
Zhenrui Yue
,
Huimin Zeng
,
Ziyi Kou
…
Secure routing in wireless sensor networks: attacks and countermeasures
Authors:
Chris Karlof
,
David T Wagner
See all similar
Cited by
2
Parametric analyses of attack-fault trees
Authors:
Étienne André
,
Didier Lime
,
Mathias Ramparison
…
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems
Authors:
Jaime Arias
,
Carlos E. Budde
,
Wojciech Penczek
…
See all cited by