Sciweavers

100 search results - page 1 / 20
» Foundations of Attack-Defense Trees
Sort
View
135
Voted
IFIP
2010
Springer
14 years 10 months ago
Foundations of Attack-Defense Trees
We introduce and give formal definitions of attack
Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Patr...
112
Voted
GAMESEC
2010
117views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Attack
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Pat...
114
Voted
CORR
2010
Springer
85views Education» more  CORR 2010»
14 years 10 months ago
Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Attack
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Pat...
135
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
150
Voted
LICS
2012
IEEE
13 years 6 months ago
Foundational, Compositional (Co)datatypes for Higher-Order Logic: Category Theory Applied to Theorem Proving
—Interactive theorem provers based on higher-order logic (HOL) traditionally follow the definitional approach, reducing high-level specifications to logical primitives. This al...
Dmitriy Traytel, Andrei Popescu, Jasmin Christian ...