University of Aberdeen logo

AURA - Aberdeen University Research Archive

 

Security Analysis Using Subjective Attack Trees

dc.contributor.authorAl-Hadhrami, Nasser
dc.contributor.authorCollinson, Matthew
dc.contributor.authorOren, Nir
dc.contributor.editorMaimut, Diana
dc.contributor.editorOprina, Andrei-George
dc.contributor.editorSauveron, Damien
dc.contributor.institutionUniversity of Aberdeen.Natural & Computing Sciencesen
dc.contributor.institutionUniversity of Aberdeen.Computing Scienceen
dc.contributor.institutionUniversity of Aberdeen.Centre for Health Data Scienceen
dc.contributor.institutionUniversity of Aberdeen.Agents at Aberdeenen
dc.contributor.institutionUniversity of Aberdeen.Cybersecurity and Privacyen
dc.date.accessioned2021-02-24T15:22:00Z
dc.date.available2021-02-24T15:22:00Z
dc.date.issued2021-02-04
dc.format.extent14
dc.format.extent602640
dc.identifier188393050
dc.identifierb48e7be7-6b67-4a15-8a4a-80667e9ce1d0
dc.identifier85101522071
dc.identifier.citationAl-Hadhrami, N, Collinson, M & Oren, N 2021, Security Analysis Using Subjective Attack Trees. in D Maimut, A-G Oprina & D Sauveron (eds), Innovative Security Solutions for Information Technology and Communications : SecITC 2020. Lecture Notes in Computer Science. vol. 12596, Lecture Notes in Computer Science, vol. 12596, Springer , pp. 288-301, Security Solutions for Information Technology and Communications - 13th International Conference, Bucharest, Romania, 19/11/20. https://doi.org/10.1007/978-3-030-69255-1_19en
dc.identifier.citationconferenceen
dc.identifier.doi10.1007/978-3-030-69255-1_19
dc.identifier.isbn978-3-030-69254-4
dc.identifier.isbn978-3-030-69255-1
dc.identifier.issn0302-9743
dc.identifier.otherRIS: urn:69705CD318181013C00A49640D58FD4A
dc.identifier.otherRIS: 10.1007/978-3-030-69255-1_19
dc.identifier.otherORCID: /0000-0002-0496-2990/work/90172346
dc.identifier.otherORCID: /0000-0002-4854-9014/work/90173835
dc.identifier.urihttps://hdl.handle.net/2164/15921
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85101522071&partnerID=8YFLogxKen
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofInnovative Security Solutions for Information Technology and Communicationsen
dc.relation.ispartofseriesLecture Notes in Computer Scienceen
dc.subjectAttack treesen
dc.subjectrisk analysisen
dc.subjectSubjective logicen
dc.subjectRisk analysisen
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subjectTheoretical Computer Scienceen
dc.subjectGeneral Computer Scienceen
dc.subject.lccQA75en
dc.titleSecurity Analysis Using Subjective Attack Treesen
dc.typeConference itemen

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
Al_Hadhrami_et_al_LNCS_SecurityAnalysisUsing_AAM.pdf
Size:
588.52 KB
Format:
Adobe Portable Document Format

Collections