We use cookies on this website, mainly to provide a secure browsing experience but also to collect statistics on how the website is used. We also embed content from third parties, including social media websites, which may include cookies. You can find out more about the cookies we set, the information we store and how we use it on our cookies page.
If you're happy to accept these cookies, simply continue browsing.
Modelling Security Risk Scenarios Using Subjective Attack Trees
Al-Hadhrami, N., Collinson, M., Oren, N.
Risks and Security of Internet and Systems. Garcia Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R. (eds.). Springer Nature Switzerland AG pp. 201-218, 18 pages.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
Innovative Security Solutions for Information Technology and Communications. Maimut, D., Oprina, A., Sauveron, D. (eds.). Springer pp. 288-301, 14 pages.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
Proc. of the 20th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2021). Endriss, U., Nowe, A., Dignum, F., Lomuscio, A. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS). 9 pages.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
A Subjective Network Approach for Cybersecurity Risk Assessment
Al-Hadhrami, N., Collinson, M., Oren, N.
13th International Conference on Security of Information and Networks. Ors, B., Elci, A. (eds.). [1] New York, NY, USA: Association for Computing Machinery pp. 1-8, 8 pages.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings