Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
2005 ◽
pp. 231-246
◽
2017 ◽
Vol 32
(4)
◽
pp. 2953-2965
◽