, A deep flaw in your car lets hackers shut down safety features
, OMG Systems Modeling Language (OMG SysML TM ), V1.0. Tech. rep., Object Management Group, 2007.
, Comput. Sci. Rev, vol.26, pp.1-16, 2017.
, Research chair Connected Cars and Cyber Security (C3S), 2019.
On the soundness of attack trees, vol.9987, pp.25-38, 2016. ,
Strategic games on defense trees, Formal Aspects in Security and Trust, 2006. ,
Using attack and protection trees to analyze threats and defenses to homeland security, pp.1-7, 2006. ,
Using attack-defense trees to analyze threats and countermeasures in an atm: A case study, vol.267, 2016.,
URL : https://hal.archives-ouvertes.fr/hal-01653513
A model-based method for system reliability analysis, vol.44, 2012. ,
Attack-defense trees based cyber security analysis for cpss, 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp.693-698, 2016. ,
Computing exact outcomes of multi-parameter attack trees, OTM Conferences, 2008. ,
Serial model for attack tree computations, Proceedings of the 12th International Conference on Information Security and Cryptology. pp. 118-128. ICISC'09, 2010. ,
Adtool: Security analysis with attack-defense trees, pp.173-176, 2013. ,
Foundations of attackdefense trees, Formal Aspects in Security and Trust, 2010. ,
Dag-based attack and defense modeling: Don't miss the forest for the attack trees, p.2013 ,
On Quantitative Analysis of Attack-Defense Trees with Repeated Labels, pp.325-346, 2018.,
URL : https://hal.archives-ouvertes.fr/hal-01825088
Elaborating security requirements by construction of intentional anti-models, Proceedings of the 26th International Conference on Software Engineering, pp.148-157, 2004. ,
Foundations of attack trees, Proceedings of the 8th International Conference on Information Security and Cryptology. pp. 186-198. ICISC'05, 2006. ,
Threat modeling using attack trees, J. Comput. Sci. Coll, vol.23, issue.4, pp.124-131, 2008. ,
, Secrets & Lies: Digital Security in a Networked World, 2000.
Qualitative and quantitative analysis of cfts taking security causes into account, Computer Safety, Reliability, and Security, pp.109-120, 2015. ,
A safety modeling method based on sysml, 2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS), pp.1180-1185, 2014. ,