Graphical Models for Security

  • Jonkers H
  • Quartel D
N/ACitations
Citations of this article
62Readers
Mendeley users who have this article in their library.

Abstract

We discuss in this paper the use of SysML-Sec attack graphs as a graphical and semi-formal representation for complex attacks. We illustrate this on a PC and mobile malware example. We furthermore pro-vide examples of the expressivity of the operators used in such diagrams. We finally formalize the attack traces described by these operators based on timed automata.

Cite

CITATION STYLE

APA

Jonkers, H., & Quartel, D. (2016). Graphical Models for Security. Third International Workshop, GraMSec 2016 (Vol. 9987, pp. 94–101). Retrieved from http://link.springer.com/10.1007/978-3-319-46263-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free