Abstract is missing.
- A Bottom-Up Approach to Applying Graphical Models in Security AnalysisXinming Ou. 1-24 [doi]
- On the Soundness of Attack TreesMaxime Audinot, Sophie Pinchinat. 25-38 [doi]
- The Right Tool for the Job: A Case for Common Input Scenarios for Security AssessmentXinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol. 39-61 [doi]
- Differential Privacy Analysis of Data Processing WorkflowsMarlon Dumas, Luciano García-Bañuelos, Peeter Laud. 62-79 [doi]
- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack TreesOlga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller. 80-93 [doi]
- Enterprise Architecture-Based Risk and Security Modelling and AnalysisHenk Jonkers, Dick A. C. Quartel. 94-101 [doi]
- From A to Z: Developing a Visual Vocabulary for Information Security Threat VisualisationEric Li, Jeroen Barendse, Frederic Brodbeck, Axel Tanner. 102-118 [doi]
- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical AnalysisNihal Pekergin, Sovanna Tan, Jean-Michel Fourneau. 119-133 [doi]
- Survivability Analysis of a Computer System Under an Advanced Persistent Threat AttackRicardo J. Rodríguez, Xiaolin Chang, Xiaodan Li, Kishor S. Trivedi. 134-149 [doi]
- Confining Adversary Actions via MeasurementPaul D. Rowe. 150-166 [doi]