GraMSec 2018 Accepted Papers
-
Harley Eades Iii, Jiaming Jiang, and Aubrey Bryant
On Linear Logic, Functional Programming, and Attack Trees
-
Ross Horne, Sjouke Mauw, and Alwen Tiu
The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement
-
Sabarathinam Chockalingam, Wolter Pieters, Andre Teixeira, Nima Khakzad, and Pieter van Gelder
Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures
-
Maxime Audinot, Sophie Pinchinat, François Schwarzentruber, and Florence Wacheux
Deciding the Non-emptiness of Attack trees
-
Marlon Dumas, Luciano García-Bañuelos, and Peeter Laud
Disclosure Analysis of SQL Workflows
-
Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, and Michael Goldsmith
A state machine system for insider threat detection
-
Mansoor Ahmed, Ilia Shumailov, and Ross Anderson
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins