Author:
Meng Baoluo,Viswanathan Arjun,Paul Saswata,Smith William,Moitra Abha,Siu Kit,Durling Michael
Funder
Defense Advanced Research Projects Agency
Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Mauw S, Oostdijk M (2006) Foundations of attack trees. In: Won DH, Kim S (eds) Information security and cryptology-ICISC 2005. Springer, Berlin, pp 186–198. https://doi.org/10.1007/11734727_17
2. Kordy B, Mauw S, Radomirović S, Schweitzer P (2011) Foundations of attack-defense trees. In: Degano P, Etalle S, Guttman J (eds) Formal aspects of security and trust. Springer, Berlin, pp 80–95. https://doi.org/10.1007/978-3-642-19751-2_6
3. Meng B, Viswanathan A, Smith W, Moitra A, Siu K, Durling M (2022) Synthesis of optimal defenses for system architecture design model in MaxSMT. In: NASA formal methods symposium, pp. 752–770. https://doi.org/10.1007/978-3-031-06773-0_40. Springer
4. MITRE common attack pattern enumeration and classification (CAPEC). https://capec.mitre.org/. Accessed: 2022-03-21
5. National institute of standards and technology 800-53. https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final. Accessed: 2022-03-21