Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case o...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
We present a new fully adaptive computational model for attack trees that allows attackers to repeat...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
Attack-defence trees are a promising approach for representing threat scenarios and possible counter...
peer reviewedRisk treatment is an important part of risk management, and deals with the question whi...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Attack-defense trees are a novel methodology for graphical security modelling and assessment. They e...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Security risk treatment often requires a complex cost-benefit analysis to be carried out in order to...
AbstractDefence trees are used to represent attack and defence strategies in security scenarios; the...
peer reviewedPerforming a thorough security risk assessment of an organisation has always been chall...
<p>Attack tree (AT) is one of the widely used non-statespace</p><p>models in security analysis. The ...
Performing a thorough security risk assessment of an organisation has always been challenging, but w...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
We present a new fully adaptive computational model for attack trees that allows attackers to repeat...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
Attack-defence trees are a promising approach for representing threat scenarios and possible counter...
peer reviewedRisk treatment is an important part of risk management, and deals with the question whi...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Attack-defense trees are a novel methodology for graphical security modelling and assessment. They e...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Security risk treatment often requires a complex cost-benefit analysis to be carried out in order to...
AbstractDefence trees are used to represent attack and defence strategies in security scenarios; the...
peer reviewedPerforming a thorough security risk assessment of an organisation has always been chall...
<p>Attack tree (AT) is one of the widely used non-statespace</p><p>models in security analysis. The ...
Performing a thorough security risk assessment of an organisation has always been challenging, but w...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
We present a new fully adaptive computational model for attack trees that allows attackers to repeat...
The success of a security attack crucially depends on the resources available to an attacker: time, ...