Conference Paper/Proceeding/Abstract 641 views
A Template-Based Method for the Generation of Attack Trees
Information Security Theory and Practice, Pages: 155 - 165
Swansea University Authors: Hoang Nguyen , Giedre Sabaliauskaite , Siraj Shaikh
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1007/978-3-030-41702-4_10
Abstract
A Template-Based Method for the Generation of Attack Trees
Published in: | Information Security Theory and Practice |
---|---|
ISBN: | 9783030417017 9783030417024 |
ISSN: | 0302-9743 1611-3349 |
Published: |
Cham
Springer International Publishing
2020
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa61837 |
first_indexed |
2022-11-30T14:45:53Z |
---|---|
last_indexed |
2023-01-13T19:22:52Z |
id |
cronfa61837 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2022-11-30T14:45:55.0570116</datestamp><bib-version>v2</bib-version><id>61837</id><entry>2022-11-09</entry><title>A Template-Based Method for the Generation of Attack Trees</title><swanseaauthors><author><sid>cb24d5c5080534dc5b5e3390f24dd422</sid><ORCID>0000-0003-0260-1697</ORCID><firstname>Hoang</firstname><surname>Nguyen</surname><name>Hoang Nguyen</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>6a674e2dbda3ec5f20599ce38199a7c3</sid><ORCID>0000-0003-1183-7001</ORCID><firstname>Giedre</firstname><surname>Sabaliauskaite</surname><name>Giedre Sabaliauskaite</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-11-09</date><deptcode>MACS</deptcode><abstract/><type>Conference Paper/Proceeding/Abstract</type><journal>Information Security Theory and Practice</journal><volume/><journalNumber/><paginationStart>155</paginationStart><paginationEnd>165</paginationEnd><publisher>Springer International Publishing</publisher><placeOfPublication>Cham</placeOfPublication><isbnPrint>9783030417017</isbnPrint><isbnElectronic>9783030417024</isbnElectronic><issnPrint>0302-9743</issnPrint><issnElectronic>1611-3349</issnElectronic><keywords>Attack trees; Generation; Automotive; Cybersecurity</keywords><publishedDay>2</publishedDay><publishedMonth>3</publishedMonth><publishedYear>2020</publishedYear><publishedDate>2020-03-02</publishedDate><doi>10.1007/978-3-030-41702-4_10</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-11-30T14:45:55.0570116</lastEdited><Created>2022-11-09T22:44:35.3051883</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Jeremy</firstname><surname>Bryans</surname><order>1</order></author><author><firstname>Lin Shen</firstname><surname>Liew</surname><order>2</order></author><author><firstname>Hoang</firstname><surname>Nguyen</surname><orcid>0000-0003-0260-1697</orcid><order>3</order></author><author><firstname>Giedre</firstname><surname>Sabaliauskaite</surname><orcid>0000-0003-1183-7001</orcid><order>4</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>5</order></author><author><firstname>Fengjun</firstname><surname>Zhou</surname><order>6</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2022-11-30T14:45:55.0570116 v2 61837 2022-11-09 A Template-Based Method for the Generation of Attack Trees cb24d5c5080534dc5b5e3390f24dd422 0000-0003-0260-1697 Hoang Nguyen Hoang Nguyen true false 6a674e2dbda3ec5f20599ce38199a7c3 0000-0003-1183-7001 Giedre Sabaliauskaite Giedre Sabaliauskaite true false 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-11-09 MACS Conference Paper/Proceeding/Abstract Information Security Theory and Practice 155 165 Springer International Publishing Cham 9783030417017 9783030417024 0302-9743 1611-3349 Attack trees; Generation; Automotive; Cybersecurity 2 3 2020 2020-03-02 10.1007/978-3-030-41702-4_10 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University 2022-11-30T14:45:55.0570116 2022-11-09T22:44:35.3051883 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Jeremy Bryans 1 Lin Shen Liew 2 Hoang Nguyen 0000-0003-0260-1697 3 Giedre Sabaliauskaite 0000-0003-1183-7001 4 Siraj Shaikh 0000-0002-0726-3319 5 Fengjun Zhou 6 |
title |
A Template-Based Method for the Generation of Attack Trees |
spellingShingle |
A Template-Based Method for the Generation of Attack Trees Hoang Nguyen Giedre Sabaliauskaite Siraj Shaikh |
title_short |
A Template-Based Method for the Generation of Attack Trees |
title_full |
A Template-Based Method for the Generation of Attack Trees |
title_fullStr |
A Template-Based Method for the Generation of Attack Trees |
title_full_unstemmed |
A Template-Based Method for the Generation of Attack Trees |
title_sort |
A Template-Based Method for the Generation of Attack Trees |
author_id_str_mv |
cb24d5c5080534dc5b5e3390f24dd422 6a674e2dbda3ec5f20599ce38199a7c3 50117e8faac2d0937989e14847105704 |
author_id_fullname_str_mv |
cb24d5c5080534dc5b5e3390f24dd422_***_Hoang Nguyen 6a674e2dbda3ec5f20599ce38199a7c3_***_Giedre Sabaliauskaite 50117e8faac2d0937989e14847105704_***_Siraj Shaikh |
author |
Hoang Nguyen Giedre Sabaliauskaite Siraj Shaikh |
author2 |
Jeremy Bryans Lin Shen Liew Hoang Nguyen Giedre Sabaliauskaite Siraj Shaikh Fengjun Zhou |
format |
Conference Paper/Proceeding/Abstract |
container_title |
Information Security Theory and Practice |
container_start_page |
155 |
publishDate |
2020 |
institution |
Swansea University |
isbn |
9783030417017 9783030417024 |
issn |
0302-9743 1611-3349 |
doi_str_mv |
10.1007/978-3-030-41702-4_10 |
publisher |
Springer International Publishing |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
0 |
active_str |
0 |
published_date |
2020-03-02T20:29:42Z |
_version_ |
1821438779179663360 |
score |
11.047609 |