- Peng Liu, Sjouke Mauw, Ketil Stølen:
Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10744, Springer 2018, ISBN 978-3-319-74859-7 [contents] - 2017
- Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, Ørnulf Jan Rødseth:
Visualizing Cyber Security Risks with Bow-Tie Diagrams. GraMSec@CSF 2017: 38-56 - Angèle Bossuat, Barbara Kordy:
Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide. GraMSec@CSF 2017: 17-37 - Ales Cernivec, Gencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Antonio Álvarez Romero:
Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. GraMSec@CSF 2017: 127-146 - Olga Gadyatskaya, Rolando Trujillo-Rasua:
New Directions in Attack Tree Research: Catching up with Industrial Needs. GraMSec@CSF 2017: 115-126 - Ryan Habibi, Jens H. Weber, Morgan Price:
Circle of Health Based Access Control for Personal Health Information Systems. GraMSec@CSF 2017: 107-114 - René Rydhof Hansen, Peter Gjøl Jensen, Kim Guldstrand Larsen, Axel Legay, Danny Bøgsted Poulsen:
Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata. GraMSec@CSF 2017: 75-90 - Dan Ionita, Margaret Ford, Alexandr Vasenev, Roel J. Wieringa:
Graphical Modeling of Security Arguments: Current State and Future Directions. GraMSec@CSF 2017: 1-16 - Letitia W. Li, Florian Lugou, Ludovic Apvrille:
Security Modeling for Embedded System Design. GraMSec@CSF 2017: 99-106 - Brian E. Ruttenberg, Dave Blumstein, Jeff Druce, Michael Howard, Fred Reed, Leslie Wilfong, Crystal Lister, Steve Gaskin, Meaghan Foley, Daniel Scofield:
Probabilistic Modeling of Insider Threat Detection Systems. GraMSec@CSF 2017: 91-98 - Aitor Couce Vieira, Siv Hilde Houmb, David Ríos Insua:
CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents. GraMSec@CSF 2017: 57-74 - 2016
- Maxime Audinot, Sophie Pinchinat:
On the Soundness of Attack Trees. GraMSec@CSF 2016: 25-38 - Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. GraMSec@CSF 2016: 39-61 - Marlon Dumas, Luciano García-Bañuelos, Peeter Laud:
Differential Privacy Analysis of Data Processing Workflows. GraMSec@CSF 2016: 62-79 - Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller:
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. GraMSec@CSF 2016: 80-93 - Henk Jonkers, Dick A. C. Quartel:
Enterprise Architecture-Based Risk and Security Modelling and Analysis. GraMSec@CSF 2016: 94-101 - Eric Li, Jeroen Barendse, Frederic Brodbeck, Axel Tanner:
From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation. GraMSec@CSF 2016: 102-118 - Xinming Ou:
A Bottom-Up Approach to Applying Graphical Models in Security Analysis. GraMSec@CSF 2016: 1-24 - Nihal Pekergin, Sovanna Tan, Jean-Michel Fourneau:
Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis. GraMSec@CSF 2016: 119-133 - Ricardo J. Rodríguez, Xiaolin Chang, Xiaodan Li, Kishor S. Trivedi:
Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack. GraMSec@CSF 2016: 134-149 - Paul D. Rowe:
Confining Adversary Actions via Measurement. GraMSec@CSF 2016: 150-166 - Sjouke Mauw, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 [contents] - Barbara Kordy, Mathias Ekstedt, Dong Seong Kim:
Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9987, Springer 2016, ISBN 978-3-319-46262-2 [contents] - 2015
- Volker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow, Ralf Steuerwald:
Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources. GraMSec@CSF 2015: 18-34 - Ludovic Apvrille, Yves Roudier:
SysML-Sec Attack Graphs: Compact Representations for Complex Attacks. GraMSec@CSF 2015: 35-49 - Laurent Cuennet, Marc Pouly, Sasa Radomirovic:
Guided Specification and Analysis of a Loyalty Card System. GraMSec@CSF 2015: 66-81 - Olga Gadyatskaya:
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. GraMSec@CSF 2015: 50-65 - Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Transforming Graphical System Models to Graphical Attack Models. GraMSec@CSF 2015: 82-96 - Sophie Pinchinat, Mathieu Acher, Didier Vojtisek:
ATSyRa: An Integrated Environment for Synthesizing Attack Trees - (Tool Paper). GraMSec@CSF 2015: 97-101 - Christian W. Probst, Jan Willemson, Wolter Pieters:
The Attack Navigator. GraMSec@CSF 2015: 1-17