Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/gramsec/HorneMT18
%A Horne, Ross
%A Mauw, Sjouke
%A Tiu, Alwen
%B GraMSec@FLoC
%D 2018
%E Cybenko, George
%E Pym, David J.
%E Fila, Barbara
%I Springer
%K dblp
%P 90-110
%T The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.
%U http://dblp.uni-trier.de/db/conf/gramsec/gramsec2018.html#HorneMT18
%V 11086
%@ 978-3-030-15465-3
@inproceedings{conf/gramsec/HorneMT18,
added-at = {2020-06-15T00:00:00.000+0200},
author = {Horne, Ross and Mauw, Sjouke and Tiu, Alwen},
biburl = {https://www.bibsonomy.org/bibtex/2b34e13fd56825006da833bc34baf6519/dblp},
booktitle = {GraMSec@FLoC},
crossref = {conf/gramsec/2018},
editor = {Cybenko, George and Pym, David J. and Fila, Barbara},
ee = {https://doi.org/10.1007/978-3-030-15465-3_6},
interhash = {d3a96f8c59a38690f1fa73bf6b1621ed},
intrahash = {b34e13fd56825006da833bc34baf6519},
isbn = {978-3-030-15465-3},
keywords = {dblp},
pages = {90-110},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2020-06-16T12:19:11.000+0200},
title = {The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.},
url = {http://dblp.uni-trier.de/db/conf/gramsec/gramsec2018.html#HorneMT18},
volume = 11086,
year = 2018
}