2012
DOI: 10.1007/978-3-642-31513-8_18
|View full text |Cite
|
Sign up to set email alerts
|

Multi Tree View of Complex Attack – Stuxnet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…No visual distance [20,19,49,51,52,99,99,110,127,147,158,167,177,186,196,203,205,247,253,262,269,277,299,305,306,310,314,315,323,324,325,334,346,354,385,386,24]…”
Section: Attack Treementioning
confidence: 99%
“…No visual distance [20,19,49,51,52,99,99,110,127,147,158,167,177,186,196,203,205,247,253,262,269,277,299,305,306,310,314,315,323,324,325,334,346,354,385,386,24]…”
Section: Attack Treementioning
confidence: 99%
“…In [175], Mishra et al also make use of ordered-AND operators, referring to [46]. The authors visually describe Stuxnet and similar attacks, but do not use Çamtepe and Yener's rigorous formalization to analyze the models.…”
Section: Enhanced Attack Treesmentioning
confidence: 99%