BOOK-CHAPTER

QuADTool: Attack-Defense-Tree Synthesis, Analysis and Bridge to Verification

Florian DorfhuberChristian EisentrautKatharina KliobaJan Křetínský

Year: 2024 Lecture notes in computer science Pages: 52-71   Publisher: Springer Science+Business Media
Keywords:
Computer science Tree (set theory) Bridge (graph theory) Computer security Mathematics Combinatorics

Metrics

1
Cited By
1.77
FWCI (Field Weighted Citation Impact)
44
Refs
0.76
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

QuADTool: Analyzing PAC-Quantitative Attack-Defense Trees

Dorfhuber, FlorianEisentraut, JuliaKlioba, KatharinaKřetínský, Jan

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2020
JOURNAL ARTICLE

QuADTool: Analyzing PAC-Quantitative Attack-Defense Trees

Dorfhuber, FlorianEisentraut, JuliaKlioba, KatharinaKřetínský, Jan

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2020
JOURNAL ARTICLE

Attack–defense tree-based analysis and optimal defense synthesis for system design

Baoluo MengArjun ViswanathanSaswata PaulWilliam SmithAbha MoitraKit SiuMichael Durling

Journal:   Innovations in Systems and Software Engineering Year: 2024 Vol: 21 (2)Pages: 635-651
JOURNAL ARTICLE

Impersonation Attack-Defense Tree

Yusep RosmansyahIgnatius Leo Sri HendartoDemby Pratama

Journal:   International Journal of Emerging Technologies in Learning (iJET) Year: 2020 Vol: 15 (19)Pages: 239-239
BOOK-CHAPTER

Attack-Defense Tree Based Security Assessment

Suguo DuHaojin Zhu

SpringerBriefs in computer science Year: 2013 Pages: 17-22
© 2026 ScienceGate Book Chapters — All rights reserved.