Computer Science – Cryptography and Security
Scientific paper
2010-06-14
Computer Science
Cryptography and Security
Added link to springerlink; Proceedings of GameSec 2010
Scientific paper
10.1007/978-3-642-17197-0
Attack--defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack--defense trees and game theory is made explicit. We show that attack--defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure.
Kordy Barbara
Mauw Sjouke
Melissen Matthijs
Schweitzer Patrick
No associations
LandOfFree
Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-422662