@inproceedings(audinot2017my, author = {Maxime Audinot and Sophie Pinchinat and Barbara Kordy}, year = {2017}, title = {Is my attack tree correct?}, booktitle = {European Symposium on Research in Computer Security}, organization = {Springer}, pages = {83--102}, doi = {10.1007/978-3-319-66402-6_7}, ) @inproceedings(chandra1976alternation, author = {Ashok K Chandra and Larry J Stockmeyer}, year = {1976}, title = {Alternation}, booktitle = {17th Annual Symposium on Foundations of Computer Science (sfcs 1976)}, organization = {IEEE}, pages = {98--108}, doi = {10.1109/SFCS.1976.4}, ) @misc(comon2008tree, author = {Hubert Comon and Max Dauchet and R{\'e}mi Gilleron and Florent Jacquemard and Denis Lugiez and Christof L{\"o}ding and Sophie Tison and Marc Tommasi}, year = {2008}, title = {Tree automata techniques and applications}, ) @article(de2007concurrent, author = {De Alfaro, Luca and Thomas A Henzinger and Orna Kupferman}, year = {2007}, title = {Concurrent reachability games}, journal = {Theoretical computer science}, volume = {386}, number = {3}, pages = {188--217}, doi = {10.1016/j.tcs.2007.07.008}, ) @article(horne2017semantics, author = {Ross Horne and Sjouke Mauw and Alwen Tiu}, year = {2017}, title = {Semantics for specialising attack trees based on linear logic}, journal = {Fundamenta Informaticae}, volume = {153}, number = {1-2}, pages = {57--86}, doi = {10.3233/FI-2017-1531}, ) @inproceedings(jhawar2015attack, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sa{\v{s}}a Radomirovi{\'c} and Trujillo-Rasua, Rolando}, year = {2015}, title = {Attack trees with sequential conjunction}, booktitle = {IFIP International Information Security and Privacy Conference}, organization = {Springer}, pages = {339--353}, doi = {10.1007/978-3-319-18467-8_23}, ) @inproceedings(jurgenson2008computing, author = {Aivo J{\"u}rgenson and Jan Willemson}, year = {2008}, title = {Computing exact outcomes of multi-parameter attack trees}, booktitle = {OTM Confederated International Conferences" On the Move to Meaningful Internet Systems"}, organization = {Springer}, pages = {1036--1051}, doi = {10.1007/978-3-540-88873-4_8}, ) @inproceedings(kordy2010foundations, author = {Barbara Kordy and Sjouke Mauw and Sa{\v{s}}a Radomirovi{\'c} and Patrick Schweitzer}, year = {2010}, title = {Foundations of attack--defense trees}, booktitle = {International Workshop on Formal Aspects in Security and Trust}, organization = {Springer}, pages = {80--95}, doi = {10.1007/978-3-642-19751-2_6}, ) @article(kordy2014attack, author = {Barbara Kordy and Sjouke Mauw and Sa{\v{s}}a Radomirovi{\'c} and Patrick Schweitzer}, year = {2014}, title = {Attack--defense trees}, journal = {Journal of Logic and Computation}, volume = {24}, number = {1}, pages = {55--87}, doi = {10.1093/logcom/exs029}, ) @inproceedings(mauw2005foundations, author = {Sjouke Mauw and Martijn Oostdijk}, year = {2005}, title = {Foundations of attack trees}, booktitle = {International Conference on Information Security and Cryptology}, organization = {Springer}, pages = {186--198}, doi = {10.1007/11734727_17}, ) @incollection(paul2015automata, author = {Soumya Paul and Ramaswamy Ramanujam and Sunil Simon}, year = {2015}, title = {Automata and compositional strategies in extensive form games}, booktitle = {Models of Strategic Reasoning}, publisher = {Springer}, pages = {174--201}, doi = {10.1007/978-3-662-48540-8_6}, ) @inproceedings(pinchinat2019attack, author = {Sophie Pinchinat and Barbara Fila and Florence Wacheux and Thierry-Mieg, Yann}, year = {2019}, title = {Attack trees: a notion of missing attacks}, booktitle = {International Workshop on Graphical Models for Security}, organization = {Springer}, pages = {23--49}, doi = {10.1007/978-3-030-36537-0_3}, ) @inproceedings(pinchinat2020library, author = {Sophie Pinchinat and Fran{\c{c}}ois Schwarzentruber and L{\^e} Cong, S{\'e}bastien}, year = {2020}, title = {Library-Based Attack Tree Synthesis}, booktitle = {International Workshop on Graphical Models for Security}, organization = {Springer}, pages = {24--44}, doi = {10.1007/978-3-030-62230-5_2}, ) @article(saffidine2019packed, author = {Abdallah Saffidine and S{\'e}bastien L{\^e} Cong and Sophie Pinchinat and Fran{\c{c}}ois Schwarzentruber}, year = {2019}, title = {The Packed Interval Covering Problem is NP-complete}, journal = {arXiv preprint arXiv:1906.03676}, ) @article(schneier1999attack, author = {Bruce Schneier}, year = {1999}, title = {Attack trees}, journal = {Dr. Dobb’s journal}, volume = {24}, number = {12}, pages = {21--29}, doi = {10.1002/9781119183631.ch21}, ) @article(widel2019beyond, author = {Wide{\l}, Wojciech and Maxime Audinot and Barbara Fila and Sophie Pinchinat}, year = {2019}, title = {Beyond 2014: Formal Methods for Attack Tree--based Security Modeling}, journal = {ACM Computing Surveys (CSUR)}, volume = {52}, number = {4}, pages = {1--36}, doi = {10.1145/3331524}, )