{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T01:29:28Z","timestamp":1762738168094,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662466650"},{"type":"electronic","value":"9783662466667"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46666-7_6","type":"book-chapter","created":{"date-parts":[[2015,3,30]],"date-time":"2015-03-30T22:57:12Z","timestamp":1427756232000},"page":"95-114","source":"Crossref","is-referenced-by-count":40,"title":["Pareto Efficient Solutions of Attack-Defence Trees"],"prefix":"10.1007","author":[{"given":"Zaruhi","family":"Aslanyan","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Vesely, W., Roberts, N., Haasl, D., Goldberg, F.: Fault Tree Handbook. Number v. 88 in Fault Tree Handbook. Systems and Reliability Research, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission (1981)"},{"key":"6_CR2","unstructured":"Weiss, J.D.: A system security engineering process. In: Proceedings of the 14th National Computer Security Conference, pp. 572\u2013581 (1991)"},{"issue":"12","key":"6_CR3","first-page":"21","volume":"24","author":"B. Schneier","year":"1999","unstructured":"Schneier, B.: Attack Trees: Modeling Security Threats. Dr. Dobb\u2019s Journal of Software Tools\u00a024(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s Journal of Software Tools"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: Availability, Reliability and Security, pp. 416\u2013423 (2006)","DOI":"10.1109\/ARES.2006.46"},{"issue":"8","key":"6_CR5","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1002\/sec.299","volume":"5","author":"A. Roy","year":"2012","unstructured":"Roy, A., Kim, D.S., Trivedi, K.S.: Attack countermeasure trees (ACT): Towards unifying the constructs of attack and defense trees. Security and Communication Networks\u00a05(8), 929\u2013943 (2012)","journal-title":"Security and Communication Networks"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","volume-title":"Formal Aspects of Security and Trust","author":"B. Kordy","year":"2011","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Foundations of attack\u2013defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol.\u00a06561, pp. 80\u201395. Springer, Heidelberg (2011)"},{"issue":"2","key":"6_CR7","first-page":"1","volume":"3","author":"A. Bagnato","year":"2012","unstructured":"Bagnato, A., Kordy, B., Meland, P.H., Schweitzer, P.: Attribute decoration of attack-defense trees. IJSSE\u00a03(2), 1\u201335 (2012)","journal-title":"IJSSE"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-17197-0_17","volume-title":"Decision and Game Theory for Security","author":"B. Kordy","year":"2010","unstructured":"Kordy, B., Mauw, S., Melissen, M., Schweitzer, P.: Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. In: Alpcan, T., Butty\u00e1n, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol.\u00a06442, pp. 245\u2013256. Springer, Heidelberg (2010)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Girard, J.Y.: Linear logic: Its syntax and semantics. In: Proceedings of the Workshop on Advances in Linear Logic, pp. 1\u201342. Cambridge University Press (1995)","DOI":"10.1017\/CBO9780511629150.002"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-12002-2_6","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J. Legriel","year":"2010","unstructured":"Legriel, J., Le Guernic, C., Cotton, S., Maler, O.: Approximating the pareto front of multi-criteria optimization problems. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol.\u00a06015, pp. 69\u201383. Springer, Heidelberg (2010)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Beyond attack trees: Dynamic security modeling with boolean logic driven markov processes (BDMP). In: Eighth European Dependable Computing Conference, EDCC-8 2010, pp. 199\u2013208 (2010)","DOI":"10.1109\/EDCC.2010.32"},{"key":"6_CR12","unstructured":"Kordy, B., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Schweitzer, P.: Dag-based attack and defense modeling: Don\u2019t miss the forest for the attack trees. CoRR abs\/1303.7397 (2013)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J.W., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: IEEE S&P 2002, pp. 273\u2013284 (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"6_CR14","unstructured":"Jha, S., Sheyner, O., Wing, J.M.: Two formal analyses of attack graphs. In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), pp. 49\u201363 (2002)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol.\u00a08414, pp. 285\u2013305. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-642-54792-8_16"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Khand, P.: System level security modeling using attack trees. In: Computer, Control and Communication, IC4 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/IC4.2009.4909245"},{"key":"6_CR17","unstructured":"Amenaza: SecurITree, http:\/\/www.amenaza.com"},{"key":"6_CR18","unstructured":"Isograph: AttackTree+, http:\/\/www.isograph.com\/software\/attacktree\/"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Vigo, R., Nielson, F., Riis Nielson, H.: Automated Generation of Attack Trees. In: 27th Computer Security Foundations Symposium (CSF 2014), pp. 337\u2013350. IEEE (2014)","DOI":"10.1109\/CSF.2014.31"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S. Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 186\u2013198. Springer, Heidelberg (2006)"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/11962977_19","volume-title":"Critical Information Infrastructures Security","author":"A. Buldas","year":"2006","unstructured":"Buldas, A., Laud, P., Priisalu, J., Saarepera, M., Willemson, J.: Rational Choice of Security Measures Via Multi-Parameter Attack Trees. In: L\u00f3pez, J. (ed.) CRITIS 2006. LNCS, vol.\u00a04347, pp. 235\u2013248. Springer, Heidelberg (2006)"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1007\/978-3-540-88873-4_8","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"A. J\u00fcrgenson","year":"2008","unstructured":"J\u00fcrgenson, A., Willemson, J.: Computing exact outcomes of multi-parameter attack trees. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol.\u00a05332, pp. 1036\u20131051. Springer, Heidelberg (2008)"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-12827-1_5","volume-title":"Information Security, Practice and Experience","author":"A. J\u00fcrgenson","year":"2010","unstructured":"J\u00fcrgenson, A., Willemson, J.: On fast and approximate attack tree computations. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol.\u00a06047, pp. 56\u201366. Springer, Heidelberg (2010)"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-02786-9_12","volume-title":"Decision and Game Theory for Security","author":"A. Buldas","year":"2013","unstructured":"Buldas, A., Lenin, A.: New efficient utility upper bounds for the fully adaptive model of attack trees. In: Das, S.K., Nita-Rotaru, C., Kantarcioglu, M. (eds.) GameSec 2013. LNCS, vol.\u00a08252, pp. 192\u2013205. Springer, Heidelberg (2013)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Edge, K., Dalton, G., Raines, R., Mills, R.: Using attack and protection trees to analyze threats and defenses to homeland security. In: MILCOM 2006, pp. 1\u20137. IEEE (2006)","DOI":"10.1109\/MILCOM.2006.302512"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Zonouz, S.A., Khurana, H., Sanders, W.H., Yardley, T.M.: RRE: A game-theoretic intrusion response and recovery engine. In: DSN 2009, pp. 439\u2013448 (2009)","DOI":"10.1109\/DSN.2009.5270307"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-25261-7_8","volume-title":"Security and Intelligent Information Systems","author":"B. Kordy","year":"2012","unstructured":"Kordy, B., Pouly, M., Schweitzer, P.: Computational aspects of attack-defense trees. In: Bouvry, P., K\u0142opotek, M.A., Lepr\u00e9vost, F., Marciniak, M., Mykowiecka, A., Rybi\u0144ski, H. (eds.) SIIS 2011. LNCS, vol.\u00a07053, pp. 103\u2013116. Springer, Heidelberg (2012)"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-319-10181-1_16","volume-title":"Integrated Formal Methods","author":"B. Kordy","year":"2014","unstructured":"Kordy, B., Pouly, M., Schweitzer, P.: A probabilistic framework for security scenarios with dependent actions. In: Albert, E., Sekerinski, E. (eds.) IFM 2014. LNCS, vol.\u00a08739, pp. 256\u2013271. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46666-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T19:25:54Z","timestamp":1747855554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46666-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662466650","9783662466667"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46666-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}