Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/gramsec/gramsec2020.bht:"
@inproceedings{DBLP:conf/gramsec/FailySSSK20, author = {Shamal Faily and Riccardo Scandariato and Adam Shostack and Laurens Sion and Duncan Ki{-}Aries}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Contextualisation of Data Flow Diagrams for Security Analysis}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {186--197}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_10}, doi = {10.1007/978-3-030-62230-5\_10}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/FailySSSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/GabbayHMT20, author = {Dov M. Gabbay and Ross Horne and Sjouke Mauw and Leendert van der Torre}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {143--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_8}, doi = {10.1007/978-3-030-62230-5\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/GabbayHMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/HagaMS20, author = {Kristian Haga and Per H{\aa}kon Meland and Guttorm Sindre}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Breaking the Cyber Kill Chain by Modelling Resource Costs}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {111--126}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_6}, doi = {10.1007/978-3-030-62230-5\_6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/HagaMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/Hines20, author = {Peter M. Hines}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {A Diagrammatic Approach to Information Flow in Encrypted Communication}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {166--185}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_9}, doi = {10.1007/978-3-030-62230-5\_9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/Hines20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/IbrahimRSAP20, author = {Amjad Ibrahim and Simon Rehwald and Antoine Scemama and Florian Andres and Alexander Pretschner}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {3--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_1}, doi = {10.1007/978-3-030-62230-5\_1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/IbrahimRSAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/KatsikeasHJELJW20, author = {Sotirios Katsikeas and Simon Hacks and Pontus Johnson and Mathias Ekstedt and Robert Lagerstr{\"{o}}m and Joar Jacobsson and Max W{\"{a}}llstedt and Per Eliasson}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {An Attack Simulation Language for the {IT} Domain}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {67--86}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_4}, doi = {10.1007/978-3-030-62230-5\_4}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/KatsikeasHJELJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/LalandeST20, author = {Jean{-}Fran{\c{c}}ois Lalande and Mathieu Simon and Val{\'{e}}rie Viet Triem Tong}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {GroDDViewer: Dynamic Dual View of Android Malware}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {127--139}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_7}, doi = {10.1007/978-3-030-62230-5\_7}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/LalandeST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/PinchinatSC20, author = {Sophie Pinchinat and Fran{\c{c}}ois Schwarzentruber and S{\'{e}}bastien L{\^{e}} Cong}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Library-Based Attack Tree Synthesis}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {24--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_2}, doi = {10.1007/978-3-030-62230-5\_2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/PinchinatSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/SchmitzS020, author = {Christopher Schmitz and Andr{\'{e}} Sekulla and Sebastian Pape}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Asset-Centric Analysis and Visualisation of Attack Trees}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {45--64}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_3}, doi = {10.1007/978-3-030-62230-5\_3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/SchmitzS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/SzekeresS20, author = {Adam Szekeres and Einar Snekkenes}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Representing Decision-Makers in {SGAM-H:} The Smart Grid Architecture Model Extended with the Human Layer}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {87--110}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_5}, doi = {10.1007/978-3-030-62230-5\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/SzekeresS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gramsec/2020, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5}, doi = {10.1007/978-3-030-62230-5}, isbn = {978-3-030-62229-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gramsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.