default search action
Search dblp for Publications
export results for "stream:conf/gramsec:"
@inproceedings{DBLP:conf/gramsec/FailySSSK20, author = {Shamal Faily and Riccardo Scandariato and Adam Shostack and Laurens Sion and Duncan Ki{-}Aries}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Contextualisation of Data Flow Diagrams for Security Analysis}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {186--197}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_10}, doi = {10.1007/978-3-030-62230-5\_10}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/FailySSSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/GabbayHMT20, author = {Dov M. Gabbay and Ross Horne and Sjouke Mauw and Leendert van der Torre}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {143--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_8}, doi = {10.1007/978-3-030-62230-5\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/GabbayHMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/HagaMS20, author = {Kristian Haga and Per H{\aa}kon Meland and Guttorm Sindre}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Breaking the Cyber Kill Chain by Modelling Resource Costs}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {111--126}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_6}, doi = {10.1007/978-3-030-62230-5\_6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/HagaMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/Hines20, author = {Peter M. Hines}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {A Diagrammatic Approach to Information Flow in Encrypted Communication}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {166--185}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_9}, doi = {10.1007/978-3-030-62230-5\_9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/Hines20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/IbrahimRSAP20, author = {Amjad Ibrahim and Simon Rehwald and Antoine Scemama and Florian Andres and Alexander Pretschner}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {3--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_1}, doi = {10.1007/978-3-030-62230-5\_1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/IbrahimRSAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/KatsikeasHJELJW20, author = {Sotirios Katsikeas and Simon Hacks and Pontus Johnson and Mathias Ekstedt and Robert Lagerstr{\"{o}}m and Joar Jacobsson and Max W{\"{a}}llstedt and Per Eliasson}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {An Attack Simulation Language for the {IT} Domain}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {67--86}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_4}, doi = {10.1007/978-3-030-62230-5\_4}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/KatsikeasHJELJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/LalandeST20, author = {Jean{-}Fran{\c{c}}ois Lalande and Mathieu Simon and Val{\'{e}}rie Viet Triem Tong}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {GroDDViewer: Dynamic Dual View of Android Malware}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {127--139}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_7}, doi = {10.1007/978-3-030-62230-5\_7}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/LalandeST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/PinchinatSC20, author = {Sophie Pinchinat and Fran{\c{c}}ois Schwarzentruber and S{\'{e}}bastien L{\^{e}} Cong}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Library-Based Attack Tree Synthesis}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {24--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_2}, doi = {10.1007/978-3-030-62230-5\_2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/PinchinatSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/SchmitzS020, author = {Christopher Schmitz and Andr{\'{e}} Sekulla and Sebastian Pape}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Asset-Centric Analysis and Visualisation of Attack Trees}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {45--64}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_3}, doi = {10.1007/978-3-030-62230-5\_3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/SchmitzS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/SzekeresS20, author = {Adam Szekeres and Einar Snekkenes}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Representing Decision-Makers in {SGAM-H:} The Smart Grid Architecture Model Extended with the Human Layer}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {87--110}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_5}, doi = {10.1007/978-3-030-62230-5\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/SzekeresS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gramsec/2020, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5}, doi = {10.1007/978-3-030-62230-5}, isbn = {978-3-030-62229-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/BeaulatonSCS19, author = {Delphine Beaulaton and Najah Ben Said and Ioana Cristescu and Salah Sadou}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Security Analysis of IoT Systems Using Attack Trees}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {68--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_5}, doi = {10.1007/978-3-030-36537-0\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/BeaulatonSCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/BerroAD19, author = {Sahar Berro and Ludovic Apvrille and Guillaume Duc}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Optimizing System Architecture Cost and Security Countermeasures}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {50--67}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_4}, doi = {10.1007/978-3-030-36537-0\_4}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/BerroAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/Cybenko19, author = {George Cybenko}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Graph Models in Tracking Behaviors for Cyber-Security}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {3--6}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_1}, doi = {10.1007/978-3-030-36537-0\_1}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/Cybenko19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/FilaW19, author = {Barbara Fila and Wojciech Widel}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Attack-Defense Trees for Abusing Optical Power Meters: {A} Case Study and the {OSEAD} Tool Experience Report}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {95--125}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_6}, doi = {10.1007/978-3-030-36537-0\_6}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/FilaW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/GadyatskayaM19, author = {Olga Gadyatskaya and Sjouke Mauw}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Attack-Tree Series: {A} Case for Dynamic Attack Tree Analysis}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {7--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_2}, doi = {10.1007/978-3-030-36537-0\_2}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/GadyatskayaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/MaoELRL19, author = {Xinyue Mao and Mathias Ekstedt and Engla Ling and Erik Ringdahl and Robert Lagerstr{\"{o}}m}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Conceptual Abstraction of Attack Graphs - {A} Use Case of securiCAD}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {186--202}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_9}, doi = {10.1007/978-3-030-36537-0\_9}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/MaoELRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/PaulV19, author = {St{\'{e}}phane Paul and Paul Varela}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Poster Support for an Obeya-Like Risk Management Approach}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {155--185}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_8}, doi = {10.1007/978-3-030-36537-0\_8}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/PaulV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/PersiaH19, author = {Fabio Persia and Sven Helmer}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {High-Level Automatic Event Detection and User Classification in a Social Network Context}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {203--219}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_10}, doi = {10.1007/978-3-030-36537-0\_10}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/PersiaH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/PinchinatFWT19, author = {Sophie Pinchinat and Barbara Fila and Florence Wacheux and Yann Thierry{-}Mieg}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Attack Trees: {A} Notion of Missing Attacks}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {23--49}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_3}, doi = {10.1007/978-3-030-36537-0\_3}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/PinchinatFWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/Wangen19, author = {Gaute Wangen}, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Quantifying and Analyzing Information Security Risk from Incident Data}, booktitle = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, pages = {129--154}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0\_7}, doi = {10.1007/978-3-030-36537-0\_7}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/Wangen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gramsec/2018, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15465-3}, doi = {10.1007/978-3-030-15465-3}, isbn = {978-3-030-15464-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gramsec/2019, editor = {Massimiliano Albanese and Ross Horne and Christian W. Probst}, title = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {11720}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36537-0}, doi = {10.1007/978-3-030-36537-0}, isbn = {978-3-030-36536-3}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/AhmedSA18, author = {Mansoor Ahmed{-}Rengers and Ilia Shumailov and Ross Anderson}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {1--12}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_1}, doi = {10.1007/978-3-030-15465-3\_1}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/AhmedSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/AudinotPSW18, author = {Maxime Audinot and Sophie Pinchinat and Fran{\c{c}}ois Schwarzentruber and Florence Wacheux}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {Deciding the Non-emptiness of Attack Trees}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {13--30}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_2}, doi = {10.1007/978-3-030-15465-3\_2}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/AudinotPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/ChockalingamPTK18, author = {Sabarathinam Chockalingam and Wolter Pieters and Andr{\'{e}} Teixeira and Nima Khakzad and Pieter H. A. J. M. van Gelder}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {31--50}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_3}, doi = {10.1007/978-3-030-15465-3\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/ChockalingamPTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/DumasGL18, author = {Marlon Dumas and Luciano Garc{\'{\i}}a{-}Ba{\~{n}}uelos and Peeter Laud}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {Disclosure Analysis of {SQL} Workflows}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {51--70}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_4}, doi = {10.1007/978-3-030-15465-3\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/DumasGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/EadesJB18, author = {Harley Eades III and Jiaming Jiang and Aubrey Bryant}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {On Linear Logic, Functional Programming, and Attack Trees}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {71--89}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_5}, doi = {10.1007/978-3-030-15465-3\_5}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/EadesJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/HorneMT18, author = {Ross Horne and Sjouke Mauw and Alwen Tiu}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {90--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_6}, doi = {10.1007/978-3-030-15465-3\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/HorneMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/ZhangAECG18, author = {Haozhe Zhang and Ioannis Agrafiotis and Arnau Erola and Sadie Creese and Michael Goldsmith}, editor = {George Cybenko and David J. Pym and Barbara Fila}, title = {A State Machine System for Insider Threat Detection}, booktitle = {5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11086}, pages = {111--129}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15465-3\_7}, doi = {10.1007/978-3-030-15465-3\_7}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/ZhangAECG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2017gramsec, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-74860-3}, doi = {10.1007/978-3-319-74860-3}, isbn = {978-3-319-74859-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2017gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BernsmedFMNR17, author = {Karin Bernsmed and Christian Fr{\o}ystad and Per H{\aa}kon Meland and Dag Atle Nesheim and {\O}rnulf Jan R{\o}dseth}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Visualizing Cyber Security Risks with Bow-Tie Diagrams}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {38--56}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_3}, doi = {10.1007/978-3-319-74860-3\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BernsmedFMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BossuatK17, author = {Ang{\`{e}}le Bossuat and Barbara Kordy}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Evil Twins: Handling Repetitions in Attack-Defense Trees - {A} Survival Guide}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {17--37}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_2}, doi = {10.1007/978-3-319-74860-3\_2}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BossuatK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CernivecEGRR17, author = {Ales Cernivec and Gencer Erdogan and Alejandra Gonzalez and Atle Refsdal and Antonio {\'{A}}lvarez Romero}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the {WISER} Approach}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {127--146}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_10}, doi = {10.1007/978-3-319-74860-3\_10}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CernivecEGRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GadyatskayaT17, author = {Olga Gadyatskaya and Rolando Trujillo{-}Rasua}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {New Directions in Attack Tree Research: Catching up with Industrial Needs}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {115--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_9}, doi = {10.1007/978-3-319-74860-3\_9}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GadyatskayaT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HabibiWP17, author = {Ryan Habibi and Jens H. Weber and Morgan Price}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Circle of Health Based Access Control for Personal Health Information Systems}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {107--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_8}, doi = {10.1007/978-3-319-74860-3\_8}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HabibiWP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HansenJLLP17, author = {Ren{\'{e}} Rydhof Hansen and Peter Gj{\o}l Jensen and Kim Guldstrand Larsen and Axel Legay and Danny B{\o}gsted Poulsen}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {75--90}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_5}, doi = {10.1007/978-3-319-74860-3\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HansenJLLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/IonitaFVW17, author = {Dan Ionita and Margaret Ford and Alexandr Vasenev and Roel J. Wieringa}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Graphical Modeling of Security Arguments: Current State and Future Directions}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {1--16}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_1}, doi = {10.1007/978-3-319-74860-3\_1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/IonitaFVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiLA17, author = {Letitia W. Li and Florian Lugou and Ludovic Apvrille}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Security Modeling for Embedded System Design}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {99--106}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_7}, doi = {10.1007/978-3-319-74860-3\_7}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RuttenbergBDHRW17, author = {Brian E. Ruttenberg and Dave Blumstein and Jeff Druce and Michael Howard and Fred Reed and Leslie Wilfong and Crystal Lister and Steve Gaskin and Meaghan Foley and Daniel Scofield}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Probabilistic Modeling of Insider Threat Detection Systems}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {91--98}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_6}, doi = {10.1007/978-3-319-74860-3\_6}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RuttenbergBDHRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/VieiraHI17, author = {Aitor Couce Vieira and Siv Hilde Houmb and David R{\'{\i}}os Insua}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {{CSIRA:} {A} Method for Analysing the Risk of Cybersecurity Incidents}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {57--74}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_4}, doi = {10.1007/978-3-319-74860-3\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/VieiraHI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AudinotP16, author = {Maxime Audinot and Sophie Pinchinat}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {On the Soundness of Attack Trees}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {25--38}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_2}, doi = {10.1007/978-3-319-46263-9\_2}, timestamp = {Wed, 17 Feb 2021 14:43:58 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AudinotP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DongJTCKSTN16, author = {Xinshu Dong and Sumeet Jauhar and William G. Temple and Binbin Chen and Zbigniew Kalbarczyk and William H. Sanders and Nils Ole Tippenhauer and David M. Nicol}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {The Right Tool for the Job: {A} Case for Common Input Scenarios for Security Assessment}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {39--61}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_3}, doi = {10.1007/978-3-319-46263-9\_3}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DongJTCKSTN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DumasGL16, author = {Marlon Dumas and Luciano Garc{\'{\i}}a{-}Ba{\~{n}}uelos and Peeter Laud}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Differential Privacy Analysis of Data Processing Workflows}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {62--79}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_4}, doi = {10.1007/978-3-319-46263-9\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DumasGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GadyatskayaHMMM16, author = {Olga Gadyatskaya and Carlo Harpes and Sjouke Mauw and C{\'{e}}dric Muller and Steve Muller}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {80--93}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_5}, doi = {10.1007/978-3-319-46263-9\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GadyatskayaHMMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JonkersQ16, author = {Henk Jonkers and Dick A. C. Quartel}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Enterprise Architecture-Based Risk and Security Modelling and Analysis}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {94--101}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_6}, doi = {10.1007/978-3-319-46263-9\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/JonkersQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiBBT16, author = {Eric Li and Jeroen Barendse and Frederic Brodbeck and Axel Tanner}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {From {A} to {Z:} Developing a Visual Vocabulary for Information Security Threat Visualisation}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {102--118}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_7}, doi = {10.1007/978-3-319-46263-9\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/LiBBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Ou16, author = {Xinming Ou}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {A Bottom-Up Approach to Applying Graphical Models in Security Analysis}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {1--24}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_1}, doi = {10.1007/978-3-319-46263-9\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Ou16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PekerginTF16, author = {Nihal Pekergin and Sovanna Tan and Jean{-}Michel Fourneau}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {119--133}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_8}, doi = {10.1007/978-3-319-46263-9\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/PekerginTF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RodriguezCLT16, author = {Ricardo J. Rodr{\'{\i}}guez and Xiaolin Chang and Xiaodan Li and Kishor S. Trivedi}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {134--149}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_9}, doi = {10.1007/978-3-319-46263-9\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/RodriguezCLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Rowe16, author = {Paul D. Rowe}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Confining Adversary Actions via Measurement}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {150--166}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_10}, doi = {10.1007/978-3-319-46263-9\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Rowe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2015gramsec, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29968-6}, doi = {10.1007/978-3-319-29968-6}, isbn = {978-3-319-29967-9}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2015gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2016gramsec, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9}, doi = {10.1007/978-3-319-46263-9}, isbn = {978-3-319-46262-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/2016gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AhlersHHKRRS15, author = {Volker Ahlers and Felix Heine and Bastian Hellmann and Carsten Kleiner and Leonard Renners and Thomas Rossow and Ralf Steuerwald}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {18--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_2}, doi = {10.1007/978-3-319-29968-6\_2}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/AhlersHHKRRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ApvrilleR15, author = {Ludovic Apvrille and Yves Roudier}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {SysML-Sec Attack Graphs: Compact Representations for Complex Attacks}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {35--49}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_3}, doi = {10.1007/978-3-319-29968-6\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ApvrilleR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuennetPR15, author = {Laurent Cuennet and Marc Pouly and Sasa Radomirovic}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Guided Specification and Analysis of a Loyalty Card System}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {66--81}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_5}, doi = {10.1007/978-3-319-29968-6\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CuennetPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Gadyatskaya15, author = {Olga Gadyatskaya}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {50--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_4}, doi = {10.1007/978-3-319-29968-6\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Gadyatskaya15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/IvanovaPHK15, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Transforming Graphical System Models to Graphical Attack Models}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {82--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_6}, doi = {10.1007/978-3-319-29968-6\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PinchinatAV15, author = {Sophie Pinchinat and Mathieu Acher and Didier Vojtisek}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {ATSyRa: An Integrated Environment for Synthesizing Attack Trees - (Tool Paper)}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {97--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_7}, doi = {10.1007/978-3-319-29968-6\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/PinchinatAV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ProbstWP15, author = {Christian W. Probst and Jan Willemson and Wolter Pieters}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {The Attack Navigator}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {1--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_1}, doi = {10.1007/978-3-319-29968-6\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ProbstWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/ApvrilleR14, author = {Ludovic Apvrille and Yves Roudier}, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems}, booktitle = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, pages = {15--30}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148.2}, doi = {10.4204/EPTCS.148.2}, timestamp = {Thu, 23 Sep 2021 11:46:10 +0200}, biburl = {https://dblp.org/rec/journals/corr/ApvrilleR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/BauereissH14, author = {Thomas Bauerei{\ss} and Dieter Hutter}, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Possibilistic Information Flow Control for Workflow Management Systems}, booktitle = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, pages = {47--62}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148.4}, doi = {10.4204/EPTCS.148.4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BauereissH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/GjaereM14, author = {Erlend Andreas Gj{\ae}re and Per H{\aa}kon Meland}, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Threats Management Throughout the Software Service Life-Cycle}, booktitle = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, pages = {1--14}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148.1}, doi = {10.4204/EPTCS.148.1}, timestamp = {Wed, 12 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GjaereM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/Paul14, author = {St{\'{e}}phane Paul}, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Towards Automating the Construction {\&} Maintenance of Attack Trees: a Feasibility Study}, booktitle = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, pages = {31--46}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148.3}, doi = {10.4204/EPTCS.148.3}, timestamp = {Wed, 12 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Paul14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/Prisacariu14, author = {Cristian Prisacariu}, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Actor Network Procedures as Psi-calculi for Security Ceremonies}, booktitle = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, pages = {63--77}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148.5}, doi = {10.4204/EPTCS.148.5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Prisacariu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/VieiraHI14, author = {Aitor Couce Vieira and Siv Hilde Houmb and David R{\'{\i}}os Insua}, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity}, booktitle = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, pages = {78--93}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148.6}, doi = {10.4204/EPTCS.148.6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VieiraHI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/corr/KordyMP14, editor = {Barbara Kordy and Sjouke Mauw and Wolter Pieters}, title = {Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014}, series = {{EPTCS}}, volume = {148}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.148}, doi = {10.4204/EPTCS.148}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KordyMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.