itrust consulting is committed to protecting your privacy and ensuring the protection of your personal information. itrust consulting takes privacy seriously. In accordance with the GDPR we implemented a privacy policy in our company that follows all principals and requirements of the GDPR.
Gadyatskaya O., Harpes C., Mauw S., Muller C., Muller S.
(2016) Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
In: Kordy B., Ekstedt M., Kim D. (eds) Graphical Models for Security.
GraMSec 2016. Lecture Notes in Computer Science, vol 9987. Springer, Cham.
itrust consulting is committed to protecting your privacy and ensuring the protection of your personal information. itrust consulting takes privacy seriously. In accordance with the GDPR we implemented a privacy policy in our company that follows all principals and requirements of the GDPR.