2018
DOI: 10.1007/978-3-319-74860-3_2
|View full text |Cite
|
Sign up to set email alerts
|

Evil Twins: Handling Repetitions in Attack–Defense Trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 13 publications
0
14
0
2
Order By: Relevance
“…In particular, following [5], we call a basic action that serves as a label for at least two nodes a clone or a cloned basic action, and interpret them as the same instance of a goal. Nodes representing distinct instances of the same goal or distinct goals are assumed in this work to have different labels.…”
Section: Attack-defense Treesmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, following [5], we call a basic action that serves as a label for at least two nodes a clone or a cloned basic action, and interpret them as the same instance of a goal. Nodes representing distinct instances of the same goal or distinct goals are assumed in this work to have different labels.…”
Section: Attack-defense Treesmentioning
confidence: 99%
“…Such approach might not always be desirable, especially when we do not only want to know whether attacks are possible, but actually how they can be achieved. To accommodate this point of view, the set semantics has recently been introduced in [5]. We briefly recall its construction below.…”
Section: Definition 1 the Propositional Semantics For Attack-defensementioning
confidence: 99%
See 1 more Smart Citation
“…Static DAGs: It is well-known that static attack trees with DAG structure cannot be analysed via a bottom-up procedure [21,23]. Several algorithms have been devised to tackle with such ATs, mostly geared to specific metrics [5,17,12,7,18].…”
Section: Open Problemmentioning
confidence: 99%
“…In particular, if O = ∅, then the proponent executing all of the actions from P achieves the root goal, regardless of the behavior of the opponent. The set semantics was first introduced in [7] and was then used in [2], where quantitative analysis of ADTrees with repeated labels has been studied. We recall the construction of the set semantics in Definition 1.…”
Section: Example 1 In the Scenario Represented By The Adtree Frommentioning
confidence: 99%