Search dblp for Publications

export results for "stream:conf/gramsec:"

 download as .bib file

@inproceedings{DBLP:conf/gramsec/FailySSSK20,
  author       = {Shamal Faily and
                  Riccardo Scandariato and
                  Adam Shostack and
                  Laurens Sion and
                  Duncan Ki{-}Aries},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Contextualisation of Data Flow Diagrams for Security Analysis},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {186--197},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_10},
  doi          = {10.1007/978-3-030-62230-5\_10},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/FailySSSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/GabbayHMT20,
  author       = {Dov M. Gabbay and
                  Ross Horne and
                  Sjouke Mauw and
                  Leendert van der Torre},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence
                  Trees},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {143--165},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_8},
  doi          = {10.1007/978-3-030-62230-5\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/GabbayHMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/HagaMS20,
  author       = {Kristian Haga and
                  Per H{\aa}kon Meland and
                  Guttorm Sindre},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Breaking the Cyber Kill Chain by Modelling Resource Costs},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_6},
  doi          = {10.1007/978-3-030-62230-5\_6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/HagaMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/Hines20,
  author       = {Peter M. Hines},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {A Diagrammatic Approach to Information Flow in Encrypted Communication},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {166--185},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_9},
  doi          = {10.1007/978-3-030-62230-5\_9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/Hines20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/IbrahimRSAP20,
  author       = {Amjad Ibrahim and
                  Simon Rehwald and
                  Antoine Scemama and
                  Florian Andres and
                  Alexander Pretschner},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Causal Model Extraction from Attack Trees to Attribute Malicious Insider
                  Attacks},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_1},
  doi          = {10.1007/978-3-030-62230-5\_1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/IbrahimRSAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/KatsikeasHJELJW20,
  author       = {Sotirios Katsikeas and
                  Simon Hacks and
                  Pontus Johnson and
                  Mathias Ekstedt and
                  Robert Lagerstr{\"{o}}m and
                  Joar Jacobsson and
                  Max W{\"{a}}llstedt and
                  Per Eliasson},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {An Attack Simulation Language for the {IT} Domain},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_4},
  doi          = {10.1007/978-3-030-62230-5\_4},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/KatsikeasHJELJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/LalandeST20,
  author       = {Jean{-}Fran{\c{c}}ois Lalande and
                  Mathieu Simon and
                  Val{\'{e}}rie Viet Triem Tong},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {GroDDViewer: Dynamic Dual View of Android Malware},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {127--139},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_7},
  doi          = {10.1007/978-3-030-62230-5\_7},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/LalandeST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/PinchinatSC20,
  author       = {Sophie Pinchinat and
                  Fran{\c{c}}ois Schwarzentruber and
                  S{\'{e}}bastien L{\^{e}} Cong},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Library-Based Attack Tree Synthesis},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_2},
  doi          = {10.1007/978-3-030-62230-5\_2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/PinchinatSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/SchmitzS020,
  author       = {Christopher Schmitz and
                  Andr{\'{e}} Sekulla and
                  Sebastian Pape},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Asset-Centric Analysis and Visualisation of Attack Trees},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_3},
  doi          = {10.1007/978-3-030-62230-5\_3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/SchmitzS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/SzekeresS20,
  author       = {Adam Szekeres and
                  Einar Snekkenes},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Representing Decision-Makers in {SGAM-H:} The Smart Grid Architecture
                  Model Extended with the Human Layer},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {87--110},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_5},
  doi          = {10.1007/978-3-030-62230-5\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/SzekeresS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gramsec/2020,
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5},
  doi          = {10.1007/978-3-030-62230-5},
  isbn         = {978-3-030-62229-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/BeaulatonSCS19,
  author       = {Delphine Beaulaton and
                  Najah Ben Said and
                  Ioana Cristescu and
                  Salah Sadou},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Security Analysis of IoT Systems Using Attack Trees},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {68--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_5},
  doi          = {10.1007/978-3-030-36537-0\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/BeaulatonSCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/BerroAD19,
  author       = {Sahar Berro and
                  Ludovic Apvrille and
                  Guillaume Duc},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Optimizing System Architecture Cost and Security Countermeasures},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_4},
  doi          = {10.1007/978-3-030-36537-0\_4},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/BerroAD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/Cybenko19,
  author       = {George Cybenko},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Graph Models in Tracking Behaviors for Cyber-Security},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {3--6},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_1},
  doi          = {10.1007/978-3-030-36537-0\_1},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/Cybenko19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/FilaW19,
  author       = {Barbara Fila and
                  Wojciech Widel},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Attack-Defense Trees for Abusing Optical Power Meters: {A} Case Study
                  and the {OSEAD} Tool Experience Report},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {95--125},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_6},
  doi          = {10.1007/978-3-030-36537-0\_6},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/FilaW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/GadyatskayaM19,
  author       = {Olga Gadyatskaya and
                  Sjouke Mauw},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Attack-Tree Series: {A} Case for Dynamic Attack Tree Analysis},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {7--19},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_2},
  doi          = {10.1007/978-3-030-36537-0\_2},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/GadyatskayaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/MaoELRL19,
  author       = {Xinyue Mao and
                  Mathias Ekstedt and
                  Engla Ling and
                  Erik Ringdahl and
                  Robert Lagerstr{\"{o}}m},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Conceptual Abstraction of Attack Graphs - {A} Use Case of securiCAD},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {186--202},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_9},
  doi          = {10.1007/978-3-030-36537-0\_9},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/MaoELRL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/PaulV19,
  author       = {St{\'{e}}phane Paul and
                  Paul Varela},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Poster Support for an Obeya-Like Risk Management Approach},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {155--185},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_8},
  doi          = {10.1007/978-3-030-36537-0\_8},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/PaulV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/PersiaH19,
  author       = {Fabio Persia and
                  Sven Helmer},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {High-Level Automatic Event Detection and User Classification in a
                  Social Network Context},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {203--219},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_10},
  doi          = {10.1007/978-3-030-36537-0\_10},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/PersiaH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/PinchinatFWT19,
  author       = {Sophie Pinchinat and
                  Barbara Fila and
                  Florence Wacheux and
                  Yann Thierry{-}Mieg},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Attack Trees: {A} Notion of Missing Attacks},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {23--49},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_3},
  doi          = {10.1007/978-3-030-36537-0\_3},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/PinchinatFWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/Wangen19,
  author       = {Gaute Wangen},
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Quantifying and Analyzing Information Security Risk from Incident
                  Data},
  booktitle    = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  pages        = {129--154},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0\_7},
  doi          = {10.1007/978-3-030-36537-0\_7},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/Wangen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gramsec/2018,
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15465-3},
  doi          = {10.1007/978-3-030-15465-3},
  isbn         = {978-3-030-15464-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gramsec/2019,
  editor       = {Massimiliano Albanese and
                  Ross Horne and
                  Christian W. Probst},
  title        = {Graphical Models for Security - 6th International Workshop, GraMSec@CSF
                  2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11720},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36537-0},
  doi          = {10.1007/978-3-030-36537-0},
  isbn         = {978-3-030-36536-3},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/AhmedSA18,
  author       = {Mansoor Ahmed{-}Rengers and
                  Ilia Shumailov and
                  Ross Anderson},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_1},
  doi          = {10.1007/978-3-030-15465-3\_1},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/AhmedSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/AudinotPSW18,
  author       = {Maxime Audinot and
                  Sophie Pinchinat and
                  Fran{\c{c}}ois Schwarzentruber and
                  Florence Wacheux},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {Deciding the Non-emptiness of Attack Trees},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {13--30},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_2},
  doi          = {10.1007/978-3-030-15465-3\_2},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/AudinotPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/ChockalingamPTK18,
  author       = {Sabarathinam Chockalingam and
                  Wolter Pieters and
                  Andr{\'{e}} Teixeira and
                  Nima Khakzad and
                  Pieter H. A. J. M. van Gelder},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between
                  Intentional Attacks and Accidental Technical Failures},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {31--50},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_3},
  doi          = {10.1007/978-3-030-15465-3\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/ChockalingamPTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/DumasGL18,
  author       = {Marlon Dumas and
                  Luciano Garc{\'{\i}}a{-}Ba{\~{n}}uelos and
                  Peeter Laud},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {Disclosure Analysis of {SQL} Workflows},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {51--70},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_4},
  doi          = {10.1007/978-3-030-15465-3\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/DumasGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/EadesJB18,
  author       = {Harley Eades III and
                  Jiaming Jiang and
                  Aubrey Bryant},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {On Linear Logic, Functional Programming, and Attack Trees},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {71--89},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_5},
  doi          = {10.1007/978-3-030-15465-3\_5},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/EadesJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/HorneMT18,
  author       = {Ross Horne and
                  Sjouke Mauw and
                  Alwen Tiu},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {The Attacker Does not Always Hold the Initiative: Attack Trees with
                  External Refinement},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {90--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_6},
  doi          = {10.1007/978-3-030-15465-3\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/HorneMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/ZhangAECG18,
  author       = {Haozhe Zhang and
                  Ioannis Agrafiotis and
                  Arnau Erola and
                  Sadie Creese and
                  Michael Goldsmith},
  editor       = {George Cybenko and
                  David J. Pym and
                  Barbara Fila},
  title        = {A State Machine System for Insider Threat Detection},
  booktitle    = {5th International Workshop on Graphical Models for Security, held
                  in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC
                  2018, Oxford, UK, July 8, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11086},
  pages        = {111--129},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15465-3\_7},
  doi          = {10.1007/978-3-030-15465-3\_7},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/ZhangAECG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2017gramsec,
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-74860-3},
  doi          = {10.1007/978-3-319-74860-3},
  isbn         = {978-3-319-74859-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2017gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BernsmedFMNR17,
  author       = {Karin Bernsmed and
                  Christian Fr{\o}ystad and
                  Per H{\aa}kon Meland and
                  Dag Atle Nesheim and
                  {\O}rnulf Jan R{\o}dseth},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Visualizing Cyber Security Risks with Bow-Tie Diagrams},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {38--56},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_3},
  doi          = {10.1007/978-3-319-74860-3\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BernsmedFMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BossuatK17,
  author       = {Ang{\`{e}}le Bossuat and
                  Barbara Kordy},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Evil Twins: Handling Repetitions in Attack-Defense Trees - {A} Survival
                  Guide},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {17--37},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_2},
  doi          = {10.1007/978-3-319-74860-3\_2},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BossuatK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CernivecEGRR17,
  author       = {Ales Cernivec and
                  Gencer Erdogan and
                  Alejandra Gonzalez and
                  Atle Refsdal and
                  Antonio {\'{A}}lvarez Romero},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring
                  - the {WISER} Approach},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_10},
  doi          = {10.1007/978-3-319-74860-3\_10},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CernivecEGRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GadyatskayaT17,
  author       = {Olga Gadyatskaya and
                  Rolando Trujillo{-}Rasua},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {New Directions in Attack Tree Research: Catching up with Industrial
                  Needs},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_9},
  doi          = {10.1007/978-3-319-74860-3\_9},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GadyatskayaT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HabibiWP17,
  author       = {Ryan Habibi and
                  Jens H. Weber and
                  Morgan Price},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Circle of Health Based Access Control for Personal Health Information
                  Systems},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {107--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_8},
  doi          = {10.1007/978-3-319-74860-3\_8},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HabibiWP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HansenJLLP17,
  author       = {Ren{\'{e}} Rydhof Hansen and
                  Peter Gj{\o}l Jensen and
                  Kim Guldstrand Larsen and
                  Axel Legay and
                  Danny B{\o}gsted Poulsen},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed
                  Automata},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_5},
  doi          = {10.1007/978-3-319-74860-3\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/HansenJLLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/IonitaFVW17,
  author       = {Dan Ionita and
                  Margaret Ford and
                  Alexandr Vasenev and
                  Roel J. Wieringa},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Graphical Modeling of Security Arguments: Current State and Future
                  Directions},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_1},
  doi          = {10.1007/978-3-319-74860-3\_1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/IonitaFVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiLA17,
  author       = {Letitia W. Li and
                  Florian Lugou and
                  Ludovic Apvrille},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Security Modeling for Embedded System Design},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {99--106},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_7},
  doi          = {10.1007/978-3-319-74860-3\_7},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LiLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RuttenbergBDHRW17,
  author       = {Brian E. Ruttenberg and
                  Dave Blumstein and
                  Jeff Druce and
                  Michael Howard and
                  Fred Reed and
                  Leslie Wilfong and
                  Crystal Lister and
                  Steve Gaskin and
                  Meaghan Foley and
                  Daniel Scofield},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Probabilistic Modeling of Insider Threat Detection Systems},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {91--98},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_6},
  doi          = {10.1007/978-3-319-74860-3\_6},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RuttenbergBDHRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/VieiraHI17,
  author       = {Aitor Couce Vieira and
                  Siv Hilde Houmb and
                  David R{\'{\i}}os Insua},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {{CSIRA:} {A} Method for Analysing the Risk of Cybersecurity Incidents},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_4},
  doi          = {10.1007/978-3-319-74860-3\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/VieiraHI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AudinotP16,
  author       = {Maxime Audinot and
                  Sophie Pinchinat},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {On the Soundness of Attack Trees},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {25--38},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_2},
  doi          = {10.1007/978-3-319-46263-9\_2},
  timestamp    = {Wed, 17 Feb 2021 14:43:58 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AudinotP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DongJTCKSTN16,
  author       = {Xinshu Dong and
                  Sumeet Jauhar and
                  William G. Temple and
                  Binbin Chen and
                  Zbigniew Kalbarczyk and
                  William H. Sanders and
                  Nils Ole Tippenhauer and
                  David M. Nicol},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {The Right Tool for the Job: {A} Case for Common Input Scenarios for
                  Security Assessment},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {39--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_3},
  doi          = {10.1007/978-3-319-46263-9\_3},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DongJTCKSTN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DumasGL16,
  author       = {Marlon Dumas and
                  Luciano Garc{\'{\i}}a{-}Ba{\~{n}}uelos and
                  Peeter Laud},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Differential Privacy Analysis of Data Processing Workflows},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_4},
  doi          = {10.1007/978-3-319-46263-9\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DumasGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GadyatskayaHMMM16,
  author       = {Olga Gadyatskaya and
                  Carlo Harpes and
                  Sjouke Mauw and
                  C{\'{e}}dric Muller and
                  Steve Muller},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies
                  with Theory of Attack Trees},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {80--93},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_5},
  doi          = {10.1007/978-3-319-46263-9\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GadyatskayaHMMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JonkersQ16,
  author       = {Henk Jonkers and
                  Dick A. C. Quartel},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Enterprise Architecture-Based Risk and Security Modelling and Analysis},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {94--101},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_6},
  doi          = {10.1007/978-3-319-46263-9\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/JonkersQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiBBT16,
  author       = {Eric Li and
                  Jeroen Barendse and
                  Frederic Brodbeck and
                  Axel Tanner},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {From {A} to {Z:} Developing a Visual Vocabulary for Information Security
                  Threat Visualisation},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {102--118},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_7},
  doi          = {10.1007/978-3-319-46263-9\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/LiBBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Ou16,
  author       = {Xinming Ou},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {A Bottom-Up Approach to Applying Graphical Models in Security Analysis},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_1},
  doi          = {10.1007/978-3-319-46263-9\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Ou16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PekerginTF16,
  author       = {Nihal Pekergin and
                  Sovanna Tan and
                  Jean{-}Michel Fourneau},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical
                  Analysis},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_8},
  doi          = {10.1007/978-3-319-46263-9\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/PekerginTF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RodriguezCLT16,
  author       = {Ricardo J. Rodr{\'{\i}}guez and
                  Xiaolin Chang and
                  Xiaodan Li and
                  Kishor S. Trivedi},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Survivability Analysis of a Computer System Under an Advanced Persistent
                  Threat Attack},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {134--149},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_9},
  doi          = {10.1007/978-3-319-46263-9\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/RodriguezCLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Rowe16,
  author       = {Paul D. Rowe},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Confining Adversary Actions via Measurement},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {150--166},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_10},
  doi          = {10.1007/978-3-319-46263-9\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Rowe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2015gramsec,
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29968-6},
  doi          = {10.1007/978-3-319-29968-6},
  isbn         = {978-3-319-29967-9},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2015gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2016gramsec,
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9},
  doi          = {10.1007/978-3-319-46263-9},
  isbn         = {978-3-319-46262-2},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/2016gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AhlersHHKRRS15,
  author       = {Volker Ahlers and
                  Felix Heine and
                  Bastian Hellmann and
                  Carsten Kleiner and
                  Leonard Renners and
                  Thomas Rossow and
                  Ralf Steuerwald},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Integrated Visualization of Network Security Metadata from Heterogeneous
                  Data Sources},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_2},
  doi          = {10.1007/978-3-319-29968-6\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/AhlersHHKRRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ApvrilleR15,
  author       = {Ludovic Apvrille and
                  Yves Roudier},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {SysML-Sec Attack Graphs: Compact Representations for Complex Attacks},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_3},
  doi          = {10.1007/978-3-319-29968-6\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ApvrilleR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuennetPR15,
  author       = {Laurent Cuennet and
                  Marc Pouly and
                  Sasa Radomirovic},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Guided Specification and Analysis of a Loyalty Card System},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_5},
  doi          = {10.1007/978-3-319-29968-6\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CuennetPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Gadyatskaya15,
  author       = {Olga Gadyatskaya},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {How to Generate Security Cameras: Towards Defence Generation for Socio-Technical
                  Systems},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {50--65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_4},
  doi          = {10.1007/978-3-319-29968-6\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Gadyatskaya15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/IvanovaPHK15,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Transforming Graphical System Models to Graphical Attack Models},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_6},
  doi          = {10.1007/978-3-319-29968-6\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/IvanovaPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PinchinatAV15,
  author       = {Sophie Pinchinat and
                  Mathieu Acher and
                  Didier Vojtisek},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {ATSyRa: An Integrated Environment for Synthesizing Attack Trees -
                  (Tool Paper)},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {97--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_7},
  doi          = {10.1007/978-3-319-29968-6\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/PinchinatAV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ProbstWP15,
  author       = {Christian W. Probst and
                  Jan Willemson and
                  Wolter Pieters},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {The Attack Navigator},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_1},
  doi          = {10.1007/978-3-319-29968-6\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ProbstWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/ApvrilleR14,
  author       = {Ludovic Apvrille and
                  Yves Roudier},
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems},
  booktitle    = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  pages        = {15--30},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148.2},
  doi          = {10.4204/EPTCS.148.2},
  timestamp    = {Thu, 23 Sep 2021 11:46:10 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ApvrilleR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/BauereissH14,
  author       = {Thomas Bauerei{\ss} and
                  Dieter Hutter},
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Possibilistic Information Flow Control for Workflow Management Systems},
  booktitle    = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  pages        = {47--62},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148.4},
  doi          = {10.4204/EPTCS.148.4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BauereissH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/GjaereM14,
  author       = {Erlend Andreas Gj{\ae}re and
                  Per H{\aa}kon Meland},
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Threats Management Throughout the Software Service Life-Cycle},
  booktitle    = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  pages        = {1--14},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148.1},
  doi          = {10.4204/EPTCS.148.1},
  timestamp    = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GjaereM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/Paul14,
  author       = {St{\'{e}}phane Paul},
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Towards Automating the Construction {\&} Maintenance of Attack
                  Trees: a Feasibility Study},
  booktitle    = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  pages        = {31--46},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148.3},
  doi          = {10.4204/EPTCS.148.3},
  timestamp    = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Paul14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/Prisacariu14,
  author       = {Cristian Prisacariu},
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Actor Network Procedures as Psi-calculi for Security Ceremonies},
  booktitle    = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  pages        = {63--77},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148.5},
  doi          = {10.4204/EPTCS.148.5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Prisacariu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/VieiraHI14,
  author       = {Aitor Couce Vieira and
                  Siv Hilde Houmb and
                  David R{\'{\i}}os Insua},
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling
                  Cybersecurity},
  booktitle    = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  pages        = {78--93},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148.6},
  doi          = {10.4204/EPTCS.148.6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VieiraHI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/corr/KordyMP14,
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148},
  doi          = {10.4204/EPTCS.148},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KordyMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics