S Mauw, M Oostdijk - Information Security and Cryptology-ICISC 2005: 8th …, 2006 - Springer
Attack trees have found their way to practice because they have proved to be an intuitive aid
in threat analysis. Despite, or perhaps thanks to, their apparent simplicity, they have not yet …