Abstract: In this paper, we explore a novel problem in cybersecurity: determining the distance between two attack trees. Attack trees, as initially described by Bruce Schneier, are rooted acyclic ...
You can trigger the automatic installation of the dependencies by playing around with the options in the first three lines of the snippet.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results