{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:18:08Z","timestamp":1773155888958,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T00:00:00Z","timestamp":1726963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,22]]},"DOI":"10.1145\/3652620.3687804","type":"proceedings-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T18:06:36Z","timestamp":1730397996000},"page":"561-569","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["From Attack Trees to Attack-Defense Trees with Generative AI &amp; Natural Language Processing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1027-1270","authenticated-orcid":false,"given":"Alan","family":"Birchler De Allende","sequence":"first","affiliation":[{"name":"T\u00e9l\u00e9com Paris, Sophia Antipolis, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5031-5794","authenticated-orcid":false,"given":"Bastien","family":"Sultan","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com Paris, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1167-4639","authenticated-orcid":false,"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com Paris, Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2024,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alan Birchler De Allende Bastien Sultan and Ludovic Apvrille. 2024. Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing. Proceedings of the 19th International Conference on Risks and Security of Internet and Systems (CRISIS 2024) (TO APPEAR)."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the ACM \/ IEEE 27th International Conference on Model Driven Engineering Languages and Systems (MODELS'2024)","author":"Apvrille Ludovic","year":"2024","unstructured":"Ludovic Apvrille and Bastien Sultan. 2024. AI-Driven Consistency of SysML Diagrams. In Proceedings of the ACM \/ IEEE 27th International Conference on Model Driven Engineering Languages and Systems (MODELS'2024), Foundations Track, Linz, Autria, Sept. 2024 (TO APPEAR)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5220\/0012320100003645"},{"key":"e_1_3_2_1_4_1","volume-title":"2018 Annual IEEE International Systems Conference (SysCon). IEEE, 1--8.","author":"Bakirtzis Georgios","year":"2018","unstructured":"Georgios Bakirtzis, Bryan T Carter, Carl R Elks, and Cody H Fleming. 2018. A model-based approach to security analysis for cyber-physical systems. In 2018 Annual IEEE International Systems Conference (SysCon). IEEE, 1--8."},{"key":"e_1_3_2_1_5_1","unstructured":"Sean Barnum. 2008. Common Attack Pattern Enumeration and Classification (CAPEC) Schema Description. Cigital."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37586-6_15"},{"key":"e_1_3_2_1_7_1","volume-title":"Optimizing System Architecture Cost and Security Countermeasures. In International Workshop on Graphical Models for Security. Springer, 50--67","author":"Berro Sahar","year":"2019","unstructured":"Sahar Berro, Ludovic Apvrille, and Guillaume Duc. 2019. Optimizing System Architecture Cost and Security Countermeasures. In International Workshop on Graphical Models for Security. Springer, 50--67."},{"key":"e_1_3_2_1_8_1","volume-title":"Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media","author":"Bird Steven","unstructured":"Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_9_1","volume-title":"Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR","author":"Chen Binbin","year":"2015","unstructured":"Binbin Chen, Christoph Schmittner, Zhendong Ma, William G Temple, Xinshu Dong, Douglas L Jones, and William H Sanders. 2015. Security analysis of urban railway systems: the need for a cyber-physical perspective. In Computer Safety, Reliability, and Security: SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings 34. Springer, 277--290."},{"key":"e_1_3_2_1_10_1","volume-title":"Incremental and Formal Verification of SysML Models","author":"Coudert Sophie","year":"2024","unstructured":"Sophie Coudert, Ludovic Apvrille, Bastien Sultan, Onana Hotescu, and Pierre de Saqui-Sannes. 2024. Incremental and Formal Verification of SysML Models. Springer Nature Computer Science (2024)."},{"key":"e_1_3_2_1_11_1","volume-title":"2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)","author":"Edge Kenneth","year":"2007","unstructured":"Kenneth Edge, Richard Raines, Michael Grimaila, Rusty Baldwin, Robert Bennington, and Christopher Reuter. 2007. The use of attack and protection trees to analyze security for an online banking system. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07). IEEE, 144b--144b."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107934"},{"key":"e_1_3_2_1_13_1","volume-title":"2020 IEEE 33rd Computer Security Foundations Symposium (CSF). IEEE, 395--410","author":"Fila Barbara","year":"2020","unstructured":"Barbara Fila and Wojciech Wide\u0142. 2020. Exploiting attack-defense trees to find an optimal set of countermeasures. In 2020 IEEE 33rd Computer Security Foundations Symposium (CSF). IEEE, 395--410."},{"key":"e_1_3_2_1_14_1","volume-title":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 961--966","author":"Kamm\u00fcller Florian","year":"2019","unstructured":"Florian Kamm\u00fcller. 2019. Combining secure system design with risk assessment for IOT healthcare systems. In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 961--966."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exs029"},{"key":"e_1_3_2_1_16_1","volume-title":"International Symposium on Mobile Internet Security. Springer, 145--162","author":"Levshun Dmitry","year":"2019","unstructured":"Dmitry Levshun, Yurii Bakhtin, Andrey Chechulin, and Igor Kotenko. 2019. Analysis of attack actions on the railway infrastructure based on the integrated model. In International Symposium on Mobile Internet Security. Springer, 145--162."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_19_1","volume-title":"2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD). INSTICC, 655--664","author":"Roudier Yves","year":"2015","unstructured":"Yves Roudier and Ludovic Apvrille. 2015. SysML-Sec: A model driven approach for designing safe and secure systems. In 2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD). INSTICC, 655--664."},{"key":"e_1_3_2_1_20_1","unstructured":"Arpan Roy. 2010. Attack countermeasure trees: A non-state-space approach towards analyzing security and finding optimal countermeasure sets."},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN","author":"Roy Arpan","year":"2012","unstructured":"Arpan Roy, Dong Seong Kim, and Kishor S Trivedi. 2012. Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 1--12."},{"key":"e_1_3_2_1_22_1","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier Bruce","year":"1999","unstructured":"Bruce Schneier. 1999. Attack trees. Dr. Dobb's journal 24, 12 (1999), 21--29.","journal-title":"Dr. Dobb's journal"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Muhammad Ali Siddiqi Robert M Seepers Mohammad Hamad Vassilis Prevelakis and Christos Strydis. 2018. Attack-tree-based Threat Modeling of Medical Implants.. In PROOFS. 32--49.","DOI":"10.29007\/8gxh"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF51468.2021.00003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Bastien Sultan Ludovic Apvrille Philippe Jaillon and Sophie Coudert. 2023. W-Sec: A Model-Based Formal Method for Assessing the Impacts of Security Countermeasures. In Model-Driven Engineering and Software Development Lu\u00eds Ferreira Pires Slimane Hammoudi and Edwin Seidewitz (Eds.). Springer Nature Switzerland Cham 203--229.","DOI":"10.1007\/978-3-031-38821-7_10"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3624583"},{"key":"e_1_3_2_1_27_1","first-page":"778","article-title":"Threat Analysis of Cyber Attacks with Attack Tree+","volume":"5","author":"Wang Ping","year":"2014","unstructured":"Ping Wang and Jia-Chi Liu. 2014. Threat Analysis of Cyber Attacks with Attack Tree+. J. Inf. Hiding Multim. Signal Process. 5, 4 (2014), 778--788.","journal-title":"J. Inf. Hiding Multim. Signal Process."}],"event":{"name":"MODELS Companion '24: ACM\/IEEE 27th International Conference on Model Driven Engineering Languages and Systems","location":"Linz Austria","acronym":"MODELS Companion '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","Johannes Kepler University Linz","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 27th International Conference on Model Driven Engineering Languages and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652620.3687804","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652620.3687804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:01Z","timestamp":1750291441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652620.3687804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,22]]},"references-count":26,"alternative-id":["10.1145\/3652620.3687804","10.1145\/3652620"],"URL":"https:\/\/doi.org\/10.1145\/3652620.3687804","relation":{},"subject":[],"published":{"date-parts":[[2024,9,22]]},"assertion":[{"value":"2024-10-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}