Journal: IJSSE

Volume 3, Issue 2

1 -- 35Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer. Attribute Decoration of Attack-Defense Trees
36 -- 53Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam. Modelling Security Using Trust Based Concepts
54 -- 73Péter Kárpáti, Guttorm Sindre, Raimundas Matulevicius. Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks