- 2020
- Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for Security Analysis. GraMSec@CSF 2020: 186-197 - Dov M. Gabbay, Ross Horne, Sjouke Mauw, Leendert van der Torre:
Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. GraMSec@CSF 2020: 143-165 - Kristian Haga, Per Håkon Meland, Guttorm Sindre:
Breaking the Cyber Kill Chain by Modelling Resource Costs. GraMSec@CSF 2020: 111-126 - Peter M. Hines:
A Diagrammatic Approach to Information Flow in Encrypted Communication. GraMSec@CSF 2020: 166-185 - Amjad Ibrahim, Simon Rehwald, Antoine Scemama, Florian Andres, Alexander Pretschner:
Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks. GraMSec@CSF 2020: 3-23 - Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt, Per Eliasson:
An Attack Simulation Language for the IT Domain. GraMSec@CSF 2020: 67-86 - Jean-François Lalande, Mathieu Simon, Valérie Viet Triem Tong:
GroDDViewer: Dynamic Dual View of Android Malware. GraMSec@CSF 2020: 127-139 - Sophie Pinchinat, François Schwarzentruber, Sébastien Lê Cong:
Library-Based Attack Tree Synthesis. GraMSec@CSF 2020: 24-44 - Christopher Schmitz, André Sekulla, Sebastian Pape:
Asset-Centric Analysis and Visualisation of Attack Trees. GraMSec@CSF 2020: 45-64 - Adam Szekeres, Einar Snekkenes:
Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer. GraMSec@CSF 2020: 87-110 - Harley Eades III, Olga Gadyatskaya:
Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers. Lecture Notes in Computer Science 12419, Springer 2020, ISBN 978-3-030-62229-9 [contents] - 2019
- Delphine Beaulaton, Najah Ben Said, Ioana Cristescu, Salah Sadou:
Security Analysis of IoT Systems Using Attack Trees. GraMSec@CSF 2019: 68-94 - Sahar Berro, Ludovic Apvrille, Guillaume Duc:
Optimizing System Architecture Cost and Security Countermeasures. GraMSec@CSF 2019: 50-67 - George Cybenko:
Graph Models in Tracking Behaviors for Cyber-Security. GraMSec@CSF 2019: 3-6 - Barbara Fila, Wojciech Widel:
Attack-Defense Trees for Abusing Optical Power Meters: A Case Study and the OSEAD Tool Experience Report. GraMSec@CSF 2019: 95-125 - Olga Gadyatskaya, Sjouke Mauw:
Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. GraMSec@CSF 2019: 7-19 - Xinyue Mao, Mathias Ekstedt, Engla Ling, Erik Ringdahl, Robert Lagerström:
Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD. GraMSec@CSF 2019: 186-202 - Stéphane Paul, Paul Varela:
Poster Support for an Obeya-Like Risk Management Approach. GraMSec@CSF 2019: 155-185 - Fabio Persia, Sven Helmer:
High-Level Automatic Event Detection and User Classification in a Social Network Context. GraMSec@CSF 2019: 203-219 - Sophie Pinchinat, Barbara Fila, Florence Wacheux, Yann Thierry-Mieg:
Attack Trees: A Notion of Missing Attacks. GraMSec@CSF 2019: 23-49 - Gaute Wangen:
Quantifying and Analyzing Information Security Risk from Incident Data. GraMSec@CSF 2019: 129-154 - George Cybenko, David J. Pym, Barbara Fila:
5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11086, Springer 2019, ISBN 978-3-030-15464-6 [contents] - Massimiliano Albanese, Ross Horne, Christian W. Probst:
Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers. Lecture Notes in Computer Science 11720, Springer 2019, ISBN 978-3-030-36536-3 [contents] - 2018
- Mansoor Ahmed-Rengers, Ilia Shumailov, Ross Anderson:
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. GraMSec@FLoC 2018: 1-12 - Maxime Audinot, Sophie Pinchinat, François Schwarzentruber, Florence Wacheux:
Deciding the Non-emptiness of Attack Trees. GraMSec@FLoC 2018: 13-30 - Sabarathinam Chockalingam, Wolter Pieters, André Teixeira, Nima Khakzad, Pieter H. A. J. M. van Gelder:
Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures. GraMSec@FLoC 2018: 31-50 - Marlon Dumas, Luciano García-Bañuelos, Peeter Laud:
Disclosure Analysis of SQL Workflows. GraMSec@FLoC 2018: 51-70 - Harley Eades III, Jiaming Jiang, Aubrey Bryant:
On Linear Logic, Functional Programming, and Attack Trees. GraMSec@FLoC 2018: 71-89 - Ross Horne, Sjouke Mauw, Alwen Tiu:
The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. GraMSec@FLoC 2018: 90-110 - Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, Michael Goldsmith:
A State Machine System for Insider Threat Detection. GraMSec@FLoC 2018: 111-129