• Attribute evaluation on attack trees with incomplete informationBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandComputers & Security2020 / art. 101630, 17 p. : ill https://doi.org/10.1016/j.cose.2019.101630 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85072949979&origin=inward&txGid=4ba37c0bee550175158bb5d1761532c1 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000501392500016
  • Attribute evaluation on attack trees with incomplete information : a preprintBuldas, Ahto; Gadyatskaya, Olga; Lenin, Aleksandr; Mauw, Sjouke; Trujillo-Rasua, RolandarXiv.org2019 / 21 p. : ill http://arxiv.org/abs/1812.10754
  • A comparative framework for cyber threat modelling : case of healthcare and industrial control systemsBalogun, Taofeek Mobolarinwa; Bahsi, Hayretdin; Keskin, Omer F.; Tatar, UnalInternational Journal of Critical Infrastructures2021 / 1 p https://doi.org/10.1504/IJCIS.2024.10046187
  • A comparative framework for cyber threat modelling: case of healthcare and industrial control systemsBalogun, Taofeek Mobolarinwa; Bahsi, Hayretdin; Keskin, Omer F.; Tatar, UnalInternational Journal of Critical Infrastructures2023 / p. 405-431 https://doi.org/10.1504/IJCIS.2023.133282 https://www.scopus.com/sourceid/26673 https://www.scopus.com/record/display.uri?eid=2-s2.0-85171740470&origin=inward&txGid=693e6cff584b654e7baf077afaea616c https://www.webofscience.com/wos/woscc/full-record/WOS:001069139400001 https://www.webofscience.com/wos/woscc/full-record/WOS:001069139400001