{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:16:15Z","timestamp":1775470575209,"version":"3.50.1"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031684159","type":"print"},{"value":"9783031684166","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68416-6_4","type":"book-chapter","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T07:02:40Z","timestamp":1724828560000},"page":"52-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["QuADTool: Attack-Defense-Tree Synthesis, Analysis and\u00a0Bridge to\u00a0Verification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3755-7171","authenticated-orcid":false,"given":"Florian","family":"Dorfhuber","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7735-8751","authenticated-orcid":false,"given":"Julia","family":"Eisentraut","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7946-917X","authenticated-orcid":false,"given":"Katharina","family":"Klioba","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8122-2881","authenticated-orcid":false,"given":"Jan","family":"K\u0159et\u00ednsk\u00fd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,29]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Andr\u00e9, \u00c9., et al.: Parametric analyses of attack-fault trees. In: 2019 19th International Conference on Application of Concurrency to System Design (ACSD), pp. 33\u201342 (2019)","DOI":"10.1109\/ACSD.2019.00008"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-54792-8_16","volume-title":"Principles of Security and Trust","author":"F Arnold","year":"2014","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 285\u2013305. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54792-8_16"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Aslanyan, Z., Nielson, F., Parker, D.: Quantitative verification and synthesis of attack-defence scenarios. In: Computer Security Foundations Symposium (CSF), pp. 105\u2013119 (2016). https:\/\/doi.org\/10.1109\/CSF.2016.15","DOI":"10.1109\/CSF.2016.15"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-319-10329-7_3","volume-title":"Smart Grid Security","author":"K Beckers","year":"2014","unstructured":"Beckers, K., Heisel, M., Krautsevich, L., Martinelli, F., Meis, R., Yautsiukhin, A.: Determining the probability of smart grid attacks by combining attack tree and attack graph analysis. In: Cuellar, J. (ed.) SmartGridSec 2014. LNCS, vol. 8448, pp. 30\u201347. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10329-7_3"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Behrmann, G., et al.: UPPAAL 4.0. In: Quantitative Evaluation of Systems (QEST), QEST 2006, Washington, DC, USA, pp. 125\u2013126. IEEE Computer Society (2006). https:\/\/doi.org\/10.1109\/QEST.2006.59. ISBN 0-7695-2665-9","DOI":"10.1109\/QEST.2006.59"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Benvenuto, D., et al.: Application of the ARIMA model on the COVID-2019 epidemic dataset. Data Brief 29 (2020). https:\/\/doi.org\/10.1016\/j.dib.2020.105340. ISSN 2352-3409","DOI":"10.1016\/j.dib.2020.105340"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-662-54580-5_9","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"CE Budde","year":"2017","unstructured":"Budde, C.E., Dehnert, C., Hahn, E.M., Hartmanns, A., Junges, S., Turrini, A.: JANI: quantitative model and tool interaction. In: Legay, A., Margaria, T. (eds.) TACAS 2017. LNCS, vol. 10206, pp. 151\u2013168. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54580-5_9"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"101630","DOI":"10.1016\/j.cose.2019.101630","volume":"88","author":"A Buldas","year":"2020","unstructured":"Buldas, A., et al.: Attribute evaluation on attack trees with incomplete information. Comput. Security. 88, 101630 (2020)","journal-title":"Comput. Security."},{"key":"4_CR9","unstructured":"Buoni, A., Fedrizzi, M., Mezei, J.: A Delphi-based approach to fraud detection using attack trees and fuzzy numbers. In: Proceeding of the IASK International Conferences, pp. 21\u201328 (2010)"},{"key":"4_CR10","unstructured":"Byres, E.J., M., Miller, D.: The use of attack trees in assessing vulnerabilities in SCADA systems. In: Proceedings of the International Infrastructure Survivability Workshop, pp. 3\u201310. Citeseer (2004)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Chatfield, C.: Calculating interval forecasts. J. Bus. Econ. Stat. 11(2), 121\u2013135 (1993). http:\/\/www.jstor.org\/stable\/1391361","DOI":"10.1080\/07350015.1993.10509938"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-36742-7_13","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T Chen","year":"2013","unstructured":"Chen, T., Forejt, V., Kwiatkowska, M., Parker, D., Simaitis, A.: PRISM-games: a model checker for stochastic multi-player games. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013. LNCS, vol. 7795, pp. 185\u2013191. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36742-7_13"},{"issue":"3","key":"4_CR13","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TPWRS.2002.804943","volume":"18","author":"J Contreras","year":"2003","unstructured":"Contreras, J., et al.: ARIMA models to predict next-day electricity prices. IEEE Trans. Power Syst. 18(3), 1014\u20131020 (2003)","journal-title":"IEEE Trans. Power Syst."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"AL-Dahasi, A.E.M., Saqib, B.N.A.: Attack tree model for potential attacks against the SCADA system. In: 2019 27th Telecommunications Forum (TELFOR), pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/TELFOR48224.2019.8971181"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-319-63390-9_31","volume-title":"Computer Aided Verification","author":"C Dehnert","year":"2017","unstructured":"Dehnert, C., Junges, S., Katoen, J.-P., Volk, M.: A Storm is coming: a modern probabilistic model checker. In: Majumdar, R., Kun\u010dak, V. (eds.) CAV 2017. LNCS, vol. 10427, pp. 592\u2013600. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63390-9_31"},{"key":"4_CR16","unstructured":"Dorfhuber, F., et al.: QuADTool: attack-defense-tree synthesis, analysis and bridge to verification (2024). arXiv: 2406.15605 [cs.CR], https:\/\/arxiv.org\/abs\/2406.15605"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-030-30281-8_12","volume-title":"Quantitative Evaluation of Systems","author":"J Eisentraut","year":"2019","unstructured":"Eisentraut, J., K\u0159et\u00ednsk\u00fd, J.: Expected cost analysis of attack-defense trees. In: Parker, D., Wolf, V. (eds.) QEST 2019. LNCS, vol. 11785, pp. 203\u2013221. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30281-8_12"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-36537-0_6","volume-title":"Graphical Models for Security","author":"B Fila","year":"2019","unstructured":"Fila, B., Wide\u0142, W.: Attack\u2013defense trees for abusing optical power meters: a case study and the OSEAD tool experience report. In: Albanese, M., Horne, R., Probst, C.W. (eds.) GraMSec 2019. LNCS, vol. 11720, pp. 95\u2013125. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36537-0_6"},{"key":"4_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-48393-1_24","volume-title":"The Practice of Enterprise Modeling","author":"M Fraile","year":"2016","unstructured":"Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M., Trujillo-Rasua, R.: Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. In: Horkoff, J., Jeusfeld, M.A., Persson, A. (eds.) PoEM 2016. LNBIP, vol. 267, pp. 326\u2013334. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48393-1_24"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-43425-4_10","volume-title":"Quantitative Evaluation of Systems","author":"O Gadyatskaya","year":"2016","unstructured":"Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., Trujillo-Rasua, R.: Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. In: Agha, G., Van Houdt, B. (eds.) QEST 2016. LNCS, vol. 9826, pp. 159\u2013162. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-43425-4_10 ISBN 978-3-319-43425-4"},{"issue":"3","key":"4_CR21","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/32.221135","volume":"19","author":"ER Gansner","year":"1993","unstructured":"Gansner, E.R., et al.: A Technique for Drawing Directed Graphs. IEEE Trans. Softw. Eng. 19(3), 214\u2013230 (1993)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/978-3-642-54862-8_51","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Hartmanns","year":"2014","unstructured":"Hartmanns, A., Hermanns, H.: The modest toolset: an integrated environment for quantitative modelling and verification. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 593\u2013598. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_51"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-662-49635-0_9","volume-title":"Principles of Security and Trust","author":"H Hermanns","year":"2016","unstructured":"Hermanns, H., Kr\u00e4mer, J., Kr\u010d\u00e1l, J., Stoelinga, M.: The value of attack-defence diagrams. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 163\u2013185. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49635-0_9"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Houmer, M., Hasnaoui, M.L.: A risk and security assessment of VANET availability using attack tree concept. Int. J. Electr. Comput. Eng. (2088-8708) 10(6) (2020)","DOI":"10.11591\/ijece.v10i6.pp6039-6044"},{"key":"4_CR25","volume-title":"Measurements and Their Uncertainties: A Practical Guide to Modern Error analysis","author":"I Hughes","year":"2010","unstructured":"Hughes, I., Hase, T.: Measurements and Their Uncertainties: A Practical Guide to Modern Error analysis. Oxford University Press, Oxford (2010)"},{"key":"4_CR26","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-18467-8_23","volume-title":"ICT Systems Security and Privacy Protection","author":"R Jhawar","year":"2015","unstructured":"Jhawar, R., Kordy, B., Mauw, S., Radomirovi\u0107, S., Trujillo-Rasua, R.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 339\u2013353. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18467-8_23"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-020-01145-7","volume":"20","author":"D Kim","year":"2020","unstructured":"Kim, D., Choi, J., Han, K.: Risk management based security evaluation model for telemedicine systems. BMC Med. Inform. Decis. Making 20(1), 1\u201314 (2020)","journal-title":"BMC Med. Inform. Decis. Making"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-981-15-8053-6_3","volume-title":"Automotive Cyber Security","author":"S Kim","year":"2020","unstructured":"Kim, S., Shrestha, R.: Security and privacy in intelligent autonomous vehicles. In: Kim, S., Shrestha, R. (eds.) Automotive Cyber Security, pp. 35\u201366. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-8053-6_3"},{"key":"4_CR29","unstructured":"Kordy, B., Pietre-Cambacedes, L., Schweitzer, P.: DAGBased attack and defense modeling: don\u2019t miss the forest for the attack trees. CoRR abs\/1303.7397 (2013). http:\/\/arxiv.org\/abs\/1303.7397"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-319-89722-6_14","volume-title":"Principles of Security and Trust","author":"B Kordy","year":"2018","unstructured":"Kordy, B., Wide\u0142, W.: On quantitative analysis of attack\u2013defense trees with repeated labels. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 325\u2013346. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_14 ISBN 978-3-319-89722-6"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","volume-title":"Formal Aspects of Security and Trust","author":"B Kordy","year":"2011","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Foundations of attack\u2013defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80\u201395. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19751-2_6 isbn: 978-3-642-19750-5"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Krichen, M., Alroobaea, R.: A new model-based framework for testing security of IoT systems in smart cities using attack trees and price timed automata. In: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, pp. 570\u2013577. SCITEPRESS-Science and Technology Publications, Lda. (2019)","DOI":"10.5220\/0007830605700577"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-319-22975-1_11","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"R Kumar","year":"2015","unstructured":"Kumar, R., Ruijters, E., Stoelinga, M.: Quantitative attack tree analysis via priced timed automata. In: Sankaranarayanan, S., Vicario, E. (eds.) FORMATS 2015. LNCS, vol. 9268, pp. 156\u2013171. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22975-1_11"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Kumar, R., Stoelinga, M.: Quantitative security and safety analysis with attack-fault trees. In: High Assurance Systems Engineering (HASE), pp. 25\u201332 (2017). https:\/\/doi.org\/10.1109\/HASE.2017.12","DOI":"10.1109\/HASE.2017.12"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_47"},{"key":"4_CR36","unstructured":"Lopez, J., et al.: Using attack trees to assess security controls for supervisory control and data acquisition systems (SCADA). In: Proceedings of the 7th International Conference on Information Warfare and Security, pp. 166\u2013177 (2012)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Lopuha\u00e4-Zwakenberg, M., Budde, C.E., Stoelinga, M.: Efficient and generic algorithms for quantitative attack tree analysis. IEEE Trans. Dependable Secure Comput. (2022)","DOI":"10.1109\/TDSC.2022.3215752"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11734727_17"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"McGough, T., Tsolacos, S.: Forecasting commercial rental values using ARIMA models. J. Prop. Valuation Invest. (1995)","DOI":"10.1108\/14635789510147801"},{"key":"4_CR40","doi-asserted-by":"publisher","unstructured":"McQueen, M.A., et al.: Quantitative cyber risk reduction estimation methodology for a small SCADA control system. In: Hawaii International Conference on System Sciences (HICSS), HICSS 2006, Washington, DC, USA, p. 226. IEEE Computer Society (2006). https:\/\/doi.org\/10.1109\/HICSS.2006.405. ISBN 0-7695-2507-5","DOI":"10.1109\/HICSS.2006.405"},{"issue":"3","key":"4_CR41","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1504\/IJEB.2011.042541","volume":"9","author":"A Buoni","year":"2011","unstructured":"Buoni, A., Fedrizzi, M., Mezei, J.: Combining attack trees and fuzzy numbers in a multi-agent approach to fraud detection. Int. J. Electron. Bus. 9(3), 186\u2013202 (2011)","journal-title":"Int. J. Electron. Bus."},{"key":"4_CR42","unstructured":"RTO NATO. Improving common security risk analysis. Technical report RTO Technical report TR-IST-049, Research and Technology Organisation of NATO (2008)"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Ohm, M., et al.: Backstabber\u2019s knife collection: a review of open source software supply chain attacks. arXiv preprint arXiv:2005.09535 (2020)","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"4_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-46263-9_8","volume-title":"Graphical Models for Security","author":"N Pekergin","year":"2016","unstructured":"Pekergin, N., Tan, S., Fourneau, J.-M.: Quantitative attack tree analysis: stochastic bounds and numerical analysis. In: Kordy, B., Ekstedt, M., Kim, D.S. (eds.) GraMSec 2016. LNCS, vol. 9987, pp. 119\u2013133. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46263-9_8"},{"key":"4_CR45","first-page":"94","volume":"27","author":"JLH Ramos","year":"2020","unstructured":"Ramos, J.L.H., Skarmeta, A.: Assessing vulnerabilities in IoT-based ambient assisted living systems. Secur. Priv. Internet Things: Challenges Solut. 27, 94 (2020)","journal-title":"Secur. Priv. Internet Things: Challenges Solut."},{"key":"4_CR46","unstructured":"Robles-Ramirez, D., et al.: Model-based cybersecurity engineering for connected and automated vehicles: the FLOURISH project (2020)"},{"issue":"19","key":"4_CR47","doi-asserted-by":"publisher","first-page":"239","DOI":"10.3991\/ijet.v15i19.12699","volume":"15","author":"Y Rosmansyah","year":"2020","unstructured":"Rosmansyah, Y., Hendarto, I., Pratama, D.: Impersonation attack-defense tree. Int. J. Emerg. Technol. Learn. (iJET) 15(19), 239\u2013246 (2020)","journal-title":"Int. J. Emerg. Technol. Learn. (iJET)"},{"key":"4_CR48","doi-asserted-by":"crossref","unstructured":"Ruijters, E., et al.: Uniform analysis of fault trees through model transformations. In: 2017 Annual Reliability and Maintainability Symposium (RAMS), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/RAM.2017.7889759"},{"key":"4_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-030-60347-2_13","volume-title":"Electronic Voting","author":"C Sch\u00fcrmann","year":"2020","unstructured":"Sch\u00fcrmann, C., Jensen, L.H., Sigbj\u00f6rnsd\u00f3ttir, R.M.: Effective cybersecurity awareness training for election officials. In: Krimmer, R., et al. (eds.) E-Vote-ID 2020. LNCS, vol. 12455, pp. 196\u2013212. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60347-2_13"},{"key":"4_CR50","unstructured":"Soligo, L.: Secure deployment of HTTPS: analysis and open challenges. B.S. thesis. Universit\u00e0 Ca\u2019Foscari Venezia (2020)"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"Ten, C.-W., Liu, C.-C., Govindarasu, M.: Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: 2007 IEEE Power Engineering Society General Meeting, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/PES.2007.385876"},{"issue":"4","key":"4_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3331524","volume":"52","author":"W Widel","year":"2019","unstructured":"Widel, W., et al.: Beyond 2014: formal methods for attack tree- based security modeling. ACM Comput. Surv. (CSUR) 52(4), 1\u201336 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"4_CR53","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s11424-014-3305-4","volume":"27","author":"Y Xiao","year":"2014","unstructured":"Xiao, Y., et al.: A multiscale modeling approach incorporating ARIMA and ANNs for financial market volatility forecasting. J. Syst. Sci. Complexity 27(1), 225\u2013236 (2014). https:\/\/doi.org\/10.1007\/s11424-014-3305-4. ISSN 1559-7067 1009-6124","journal-title":"J. Syst. Sci. Complexity"}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems and Formal Modeling and Analysis of Timed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68416-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T07:06:30Z","timestamp":1724828790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68416-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031684159","9783031684166"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68416-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QEST+FORMATS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Quantitative Evaluation of Systems and Formal Modeling and Analysis of Timed Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Calgary, AB","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"qest2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.qest-formats.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}