Inproceedings,

Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.

, , and .
HCI (20), volume 9750 of Lecture Notes in Computer Science, page 234-246. Springer, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews