Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/qest/GadyatskayaJKLM16
%A Gadyatskaya, Olga
%A Jhawar, Ravi
%A Kordy, Piotr
%A Lounis, Karim
%A Mauw, Sjouke
%A Trujillo-Rasua, Rolando
%B QEST
%D 2016
%E Agha, Gul
%E Houdt, Benny Van
%I Springer
%K dblp
%P 159-162
%T Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
%U http://dblp.uni-trier.de/db/conf/qest/qest2016.html#GadyatskayaJKLM16
%V 9826
%@ 978-3-319-43424-7
@inproceedings{conf/qest/GadyatskayaJKLM16,
added-at = {2018-11-02T00:00:00.000+0100},
author = {Gadyatskaya, Olga and Jhawar, Ravi and Kordy, Piotr and Lounis, Karim and Mauw, Sjouke and Trujillo-Rasua, Rolando},
biburl = {https://www.bibsonomy.org/bibtex/207a6ab6447adf6aecbf42b48b4c6695c/dblp},
booktitle = {QEST},
crossref = {conf/qest/2016},
editor = {Agha, Gul and Houdt, Benny Van},
ee = {https://doi.org/10.1007/978-3-319-43425-4_10},
interhash = {e277cf0bf311ab8dc51e72185f1fb333},
intrahash = {07a6ab6447adf6aecbf42b48b4c6695c},
isbn = {978-3-319-43424-7},
keywords = {dblp},
pages = {159-162},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T19:23:09.000+0200},
title = {Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.},
url = {http://dblp.uni-trier.de/db/conf/qest/qest2016.html#GadyatskayaJKLM16},
volume = 9826,
year = 2016
}