Barbara Kordy

Orcid: 0000-0002-1824-7621

Affiliations:
  • INSA Rennes, Computer Science and Random Systems Research Institute (IRISA)
  • University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust
  • University of Orléans, Computer Science Laboratory (LIFO)


According to our database1, Barbara Kordy authored at least 31 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Nothing is Out-of-Band: Formal Modeling of Ceremonies.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2020
Exploiting attack-defense trees to find an optimal set of countermeasures.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Beyond 2014: Formal Methods for Attack Tree-based Security Modeling.
ACM Comput. Surv., 2019

Attack Trees: A Notion of Missing Attacks.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

Attack-Defense Trees for Abusing Optical Power Meters: A Case Study and the OSEAD Tool Experience Report.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

Guided Design of Attack Trees: A System-Based Approach.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Is my attack tree correct? Extended version.
CoRR, 2017

How Well Can I Secure My System?
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017

Is My Attack Tree Correct?
Proceedings of the Computer Security - ESORICS 2017, 2017

Evil Twins: Handling Repetitions in Attack-Defense Trees - A Survival Guide.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

How to Handle Rainbow Tables with External Memory.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Probabilistic reasoning with graphical security models.
Inf. Sci., 2016

SPTool - Equivalence Checker for SAND Attack Trees.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
Attack Trees with Sequential Conjunction.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Attack-defense trees.
J. Log. Comput., 2014

DAG-based attack and defense modeling: Don't miss the forest for the attack trees.
Comput. Sci. Rev., 2014

A Probabilistic Framework for Security Scenarios with Dependent Actions.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

2013
ADTool: Security Analysis with Attack- Defense Trees (Extended Version)
CoRR, 2013

ADTool: Security Analysis with Attack-Defense Trees.
Proceedings of the Quantitative Evaluation of Systems - 10th International Conference, 2013

2012
Attribute Decoration of Attack-Defense Trees.
Int. J. Secur. Softw. Eng., 2012

Quantitative Questions on Attack-Defense Trees.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Constructing Optimistic Multi-party Contract Signing Protocols.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Computational Aspects of Attack-Defense Trees.
Proceedings of the Security and Intelligent Information Systems, 2011

2010
Foundations of Attack-Defense Trees.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent.
Proceedings of the Decision and Game Theory for Security, 2010

2008
Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès.
PhD thesis, 2008

A Rewrite Approach for Pattern Containment.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2008

A Rewrite Approach for Pattern Containment - Application to Query Evaluation on Compressed Documents.
Proceedings of the Structure-Based Compression of Complex Massive Data, 22.06., 2008

2006
Automata for Positive Core XPath Queries on Compressed Documents.
Proceedings of the Logic for Programming, 2006


  Loading...