BOOK-CHAPTER

Improvements of Attack-Defense Trees for Threat Analysis

Ping WangJia-Chi Liu

Year: 2012 Smart innovation, systems and technologies Pages: 91-100   Publisher: Springer Nature
Keywords:
Computer security Computer science Vulnerability (computing) Cyber threats Scheme (mathematics) Security analysis Probabilistic logic Converse Node (physics) Engineering Mathematics

Metrics

3
Cited By
0.00
FWCI (Field Weighted Citation Impact)
11
Refs
0.16
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Threat Risk Analysis for Cloud Security based on Attack-Defense Trees

Ping WangHui‐Tang LinTzu Chia Wang -Wen-Hui LinPuTsun Kuo -

Journal:   International Journal of Advancements in Computing Technology Year: 2012 Vol: 4 (17)Pages: 607-617
BOOK-CHAPTER

Quantitative Analysis of Attack Defense Trees

Nihal PekerginSovanna Tan

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2021 Pages: 207-220
JOURNAL ARTICLE

Attack-defense trees

Barbara KordySjouke MauwSaša RadomirovićPascal Schweitzer

Journal:   Journal of Logic and Computation Year: 2012 Vol: 24 (1)Pages: 55-87
BOOK-CHAPTER

Cyber-Attack Risks Analysis Based on Attack-Defense Trees

Wenjun SunLiqun LvYang SuXu An Wang

Lecture notes on data engineering and communications technologies Year: 2017 Pages: 667-678
© 2026 ScienceGate Book Chapters — All rights reserved.