Abstract is missing.
- The Attack NavigatorChristian W. Probst, Jan Willemson, Wolter Pieters. 1-17 [doi]
- Integrated Visualization of Network Security Metadata from Heterogeneous Data SourcesVolker Ahlers, Felix Heine, Bastian Hellmann, Carsten Kleiner, Leonard Renners, Thomas Rossow, Ralf Steuerwald. 18-34 [doi]
- SysML-Sec Attack Graphs: Compact Representations for Complex AttacksLudovic Apvrille, Yves Roudier. 35-49 [doi]
- How to Generate Security Cameras: Towards Defence Generation for Socio-Technical SystemsOlga Gadyatskaya. 50-65 [doi]
- Guided Specification and Analysis of a Loyalty Card SystemLaurent Cuennet, Marc Pouly, Sasa Radomirovic. 66-81 [doi]
- Transforming Graphical System Models to Graphical Attack ModelsMarieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller. 82-96 [doi]
- ATSyRa: An Integrated Environment for Synthesizing Attack Trees - (Tool Paper)Sophie Pinchinat, Mathieu Acher, Didier Vojtisek. 97-101 [doi]