Show simple item record

dc.contributor.authorAl-Hadhrami, Nasser
dc.contributor.authorCollinson, Matthew
dc.contributor.authorOren, Nir
dc.contributor.editorMaimut, Diana
dc.contributor.editorOprina, Andrei-George
dc.contributor.editorSauveron, Damien
dc.date.accessioned2021-02-24T15:22:00Z
dc.date.available2021-02-24T15:22:00Z
dc.date.issued2021-02-04
dc.identifier.citationAl-Hadhrami , N , Collinson , M & Oren , N 2021 , Security Analysis Using Subjective Attack Trees . in D Maimut , A-G Oprina & D Sauveron (eds) , Innovative Security Solutions for Information Technology and Communications : SecITC 2020. Lecture Notes in Computer Science . vol. 12596 , Lecture Notes in Computer Science , vol. 12596 , Springer , pp. 288-301 , Security Solutions for Information Technology and Communications - 13th International Conference , Bucharest , Romania , 19/11/20 . https://doi.org/10.1007/978-3-030-69255-1_19en
dc.identifier.citationconferenceen
dc.identifier.isbn978-3-030-69254-4
dc.identifier.isbn978-3-030-69255-1
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 188393050
dc.identifier.otherPURE UUID: b48e7be7-6b67-4a15-8a4a-80667e9ce1d0
dc.identifier.otherRIS: urn:69705CD318181013C00A49640D58FD4A
dc.identifier.otherRIS: 10.1007/978-3-030-69255-1_19
dc.identifier.otherORCID: /0000-0002-0496-2990/work/90172346
dc.identifier.otherORCID: /0000-0002-4854-9014/work/90173835
dc.identifier.otherScopus: 85101522071
dc.identifier.urihttps://hdl.handle.net/2164/15921
dc.format.extent14
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofInnovative Security Solutions for Information Technology and Communicationsen
dc.relation.ispartofseriesLecture Notes in Computer Scienceen
dc.rightsThe final authenticated version is available online at https://doi.org/10.1007/978-3-030-69255-1_19en
dc.subjectAttack treesen
dc.subjectrisk analysisen
dc.subjectSubjective logicen
dc.subjectRisk analysisen
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subjectTheoretical Computer Scienceen
dc.subjectComputer Science(all)en
dc.subject.lccQA75en
dc.titleSecurity Analysis Using Subjective Attack Treesen
dc.typeConference itemen
dc.contributor.institutionUniversity of Aberdeen.Natural & Computing Sciencesen
dc.contributor.institutionUniversity of Aberdeen.Computing Scienceen
dc.contributor.institutionUniversity of Aberdeen.Computer Science and Informaticsen
dc.contributor.institutionUniversity of Aberdeen.Centre for Health Data Scienceen
dc.description.versionPostprinten
dc.identifier.doihttps://doi.org/10.1007/978-3-030-69255-1_19
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85101522071&partnerID=8YFLogxKen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record