Abstract is missing.
- Graphical Modeling of Security Arguments: Current State and Future DirectionsDan Ionita, Margaret Ford, Alexandr Vasenev, Roel Wieringa. 1-16 [doi]
- Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival GuideAngèle Bossuat, Barbara Kordy. 17-37 [doi]
- Visualizing Cyber Security Risks with Bow-Tie DiagramsKarin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, Ørnulf Jan Rødseth. 38-56 [doi]
- CSIRA: A Method for Analysing the Risk of Cybersecurity IncidentsAitor Couce Vieira, Siv Hilde Houmb, David Ríos Insua. 57-74 [doi]
- Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed AutomataRené Rydhof Hansen, Peter Gjøl Jensen, Kim Guldstrand Larsen, Axel Legay, Danny Bøgsted Poulsen. 75-90 [doi]
- Probabilistic Modeling of Insider Threat Detection SystemsBrian E. Ruttenberg, Dave Blumstein, Jeff Druce, Michael Howard, Fred Reed, Leslie Wilfong, Crystal Lister, Steve Gaskin, Meaghan Foley, Daniel Scofield. 91-98 [doi]
- Security Modeling for Embedded System DesignLetitia W. Li, Florian Lugou, Ludovic Apvrille. 99-106 [doi]
- Circle of Health Based Access Control for Personal Health Information SystemsRyan Habibi, Jens H. Weber, Morgan Price. 107-114 [doi]
- New Directions in Attack Tree Research: Catching up with Industrial NeedsOlga Gadyatskaya, Rolando Trujillo-Rasua. 115-126 [doi]
- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER ApproachAles Cernivec, Gencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Antonio Álvarez Romero. 127-146 [doi]