Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/formats/GadyatskayaHLLO16
%A Gadyatskaya, Olga
%A Hansen, René Rydhof
%A Larsen, Kim Guldstrand
%A Legay, Axel
%A Olesen, Mads Chr.
%A Poulsen, Danny Bøgsted
%B FORMATS
%D 2016
%E Fränzle, Martin
%E Markey, Nicolas
%I Springer
%K dblp
%P 35-50
%T Modelling Attack-defense Trees Using Timed Automata.
%U http://dblp.uni-trier.de/db/conf/formats/formats2016.html#GadyatskayaHLLO16
%V 9884
%@ 978-3-319-44877-0
@inproceedings{conf/formats/GadyatskayaHLLO16,
added-at = {2024-05-07T00:00:00.000+0200},
author = {Gadyatskaya, Olga and Hansen, René Rydhof and Larsen, Kim Guldstrand and Legay, Axel and Olesen, Mads Chr. and Poulsen, Danny Bøgsted},
biburl = {https://www.bibsonomy.org/bibtex/2d9c7613b1bf77fa90b62f7a65c6350c2/dblp},
booktitle = {FORMATS},
crossref = {conf/formats/2016},
editor = {Fränzle, Martin and Markey, Nicolas},
ee = {https://doi.org/10.1007/978-3-319-44878-7_3},
interhash = {654b31d21585c3f8106d2de692cb8d0f},
intrahash = {d9c7613b1bf77fa90b62f7a65c6350c2},
isbn = {978-3-319-44877-0},
keywords = {dblp},
pages = {35-50},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-05-13T09:32:26.000+0200},
title = {Modelling Attack-defense Trees Using Timed Automata.},
url = {http://dblp.uni-trier.de/db/conf/formats/formats2016.html#GadyatskayaHLLO16},
volume = 9884,
year = 2016
}