@dblp

Attack Tree Generation by Policy Invalidation.

, , , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 249-259. Springer, (2015)

Links and resources

Tags