BOOK-CHAPTER

Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

Keywords:
Computer science Ranking (information retrieval) Software Computer security Data mining Information retrieval Programming language

Metrics

50
Cited By
14.52
FWCI (Field Weighted Citation Impact)
10
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

BOOK-CHAPTER

ADTool: Security Analysis with Attack–Defense Trees

Barbara KordyPiotr KordySjouke MauwPatrick Schweitzer

Lecture notes in computer science Year: 2013 Pages: 173-176
BOOK-CHAPTER

Modelling Security Risk Scenarios Using Subjective Attack Trees

Nasser Al-HadhramiMatthew CollinsonNir Oren

Lecture notes in computer science Year: 2021 Pages: 201-218
JOURNAL ARTICLE

Practical Relative Order Attack in Deep Ranking

Mo ZhouLe WangZhenxing NiuQilin ZhangYinghui XuNanning ZhengGang Hua

Journal:   2021 IEEE/CVF International Conference on Computer Vision (ICCV) Year: 2021 Pages: 16393-16402
© 2026 ScienceGate Book Chapters — All rights reserved.