![]() | ![]() |
2007 | ||
---|---|---|
2 | EE | Nayot Poolsapassit, Indrajit Ray: Investigating Computer Attacks Using Attack Trees. IFIP Int. Conf. Digital Forensics 2007: 331-343 |
2005 | ||
1 | EE | Indrajit Ray, Nayot Poolsapassit: Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. ESORICS 2005: 231-246 |
1 | Indrajit Ray | [1] [2] |