From post

Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study.

, , , , , и . PoEM, том 267 из Lecture Notes in Business Information Processing, стр. 326-334. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy in RFID and mobile objects.. CoRR, (2013)New Directions in Attack Tree Research: Catching up with Industrial Needs., и . GraMSec@CSF, том 10744 из Lecture Notes in Computer Science, стр. 115-126. Springer, (2017)Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs., и . Comput. J., 59 (8): 1264-1273 (2016)Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph., , и . Fundam. Informaticae, 152 (3): 273-287 (2017)Forward Traceability for Product Authenticity Using Ethereum Smart Contracts., , , , и . NSS, том 13787 из Lecture Notes in Computer Science, стр. 514-523. Springer, (2022)Privacy in rfid and mobile objects.. University of Rovira i Virgili, Spain, (2012)Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0., , , , , и . QEST, том 9826 из Lecture Notes in Computer Science, стр. 159-162. Springer, (2016)Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding.. MobiQuitous, том 131 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 289-302. Springer, (2013)A Class of Precomputation-Based Distance-Bounding Protocols., , и . EuroS&P, стр. 97-111. IEEE, (2016)On the optimal resistance against mafia and distance fraud in distance-bounding protocols., , и . Comput. Commun., (октября 2023)