Пожалуйста, войдите в систему, чтобы принять участие в дискуссии (добавить собственные рецензию, или комментарий)
Цитировать эту публикацию
%0 Conference Paper
%1 conf/csfw/GadyatskayaHMMM16
%A Gadyatskaya, Olga
%A Harpes, Carlo
%A Mauw, Sjouke
%A Muller, Cédric
%A Muller, Steve
%B GraMSec@CSF
%D 2016
%E Kordy, Barbara
%E Ekstedt, Mathias
%E Kim, Dong Seong
%I Springer
%K dblp
%P 80-93
%T Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
%U http://dblp.uni-trier.de/db/conf/csfw/gramsec2016.html#GadyatskayaHMMM16
%V 9987
%@ 978-3-319-46262-2
@inproceedings{conf/csfw/GadyatskayaHMMM16,
added-at = {2017-05-25T00:00:00.000+0200},
author = {Gadyatskaya, Olga and Harpes, Carlo and Mauw, Sjouke and Muller, Cédric and Muller, Steve},
biburl = {https://www.bibsonomy.org/bibtex/2359d1901b3d33f42c0e4c79e0a333fc9/dblp},
booktitle = {GraMSec@CSF},
crossref = {conf/csfw/2016gramsec},
editor = {Kordy, Barbara and Ekstedt, Mathias and Kim, Dong Seong},
ee = {https://doi.org/10.1007/978-3-319-46263-9_5},
interhash = {6dd80868d6458ae8b93656ebb58b8f42},
intrahash = {359d1901b3d33f42c0e4c79e0a333fc9},
isbn = {978-3-319-46262-2},
keywords = {dblp},
pages = {80-93},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-09T13:15:59.000+0200},
title = {Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.},
url = {http://dblp.uni-trier.de/db/conf/csfw/gramsec2016.html#GadyatskayaHMMM16},
volume = 9987,
year = 2016
}