Security Analysis Using Subjective Attack Trees
| dc.contributor.author | Al-Hadhrami, Nasser | |
| dc.contributor.author | Collinson, Matthew | |
| dc.contributor.author | Oren, Nir | |
| dc.contributor.editor | Maimut, Diana | |
| dc.contributor.editor | Oprina, Andrei-George | |
| dc.contributor.editor | Sauveron, Damien | |
| dc.contributor.institution | University of Aberdeen.Natural & Computing Sciences | en |
| dc.contributor.institution | University of Aberdeen.Computing Science | en |
| dc.contributor.institution | University of Aberdeen.Centre for Health Data Science | en |
| dc.contributor.institution | University of Aberdeen.Agents at Aberdeen | en |
| dc.contributor.institution | University of Aberdeen.Cybersecurity and Privacy | en |
| dc.date.accessioned | 2021-02-24T15:22:00Z | |
| dc.date.available | 2021-02-24T15:22:00Z | |
| dc.date.issued | 2021-02-04 | |
| dc.format.extent | 14 | |
| dc.format.extent | 602640 | |
| dc.identifier | 188393050 | |
| dc.identifier | b48e7be7-6b67-4a15-8a4a-80667e9ce1d0 | |
| dc.identifier | 85101522071 | |
| dc.identifier.citation | Al-Hadhrami, N, Collinson, M & Oren, N 2021, Security Analysis Using Subjective Attack Trees. in D Maimut, A-G Oprina & D Sauveron (eds), Innovative Security Solutions for Information Technology and Communications : SecITC 2020. Lecture Notes in Computer Science. vol. 12596, Lecture Notes in Computer Science, vol. 12596, Springer , pp. 288-301, Security Solutions for Information Technology and Communications - 13th International Conference, Bucharest, Romania, 19/11/20. https://doi.org/10.1007/978-3-030-69255-1_19 | en |
| dc.identifier.citation | conference | en |
| dc.identifier.doi | 10.1007/978-3-030-69255-1_19 | |
| dc.identifier.isbn | 978-3-030-69254-4 | |
| dc.identifier.isbn | 978-3-030-69255-1 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.other | RIS: urn:69705CD318181013C00A49640D58FD4A | |
| dc.identifier.other | RIS: 10.1007/978-3-030-69255-1_19 | |
| dc.identifier.other | ORCID: /0000-0002-0496-2990/work/90172346 | |
| dc.identifier.other | ORCID: /0000-0002-4854-9014/work/90173835 | |
| dc.identifier.uri | https://hdl.handle.net/2164/15921 | |
| dc.identifier.url | http://www.scopus.com/inward/record.url?scp=85101522071&partnerID=8YFLogxK | en |
| dc.language.iso | eng | |
| dc.publisher | Springer | |
| dc.relation.ispartof | Innovative Security Solutions for Information Technology and Communications | en |
| dc.relation.ispartofseries | Lecture Notes in Computer Science | en |
| dc.subject | Attack trees | en |
| dc.subject | risk analysis | en |
| dc.subject | Subjective logic | en |
| dc.subject | Risk analysis | en |
| dc.subject | QA75 Electronic computers. Computer science | en |
| dc.subject | Theoretical Computer Science | en |
| dc.subject | General Computer Science | en |
| dc.subject.lcc | QA75 | en |
| dc.title | Security Analysis Using Subjective Attack Trees | en |
| dc.type | Conference item | en |
Files
Original bundle
1 - 1 of 1
- Name:
- Al_Hadhrami_et_al_LNCS_SecurityAnalysisUsing_AAM.pdf
- Size:
- 588.52 KB
- Format:
- Adobe Portable Document Format
