Description:
Attack trees are a powerful way to understand how real-world cyber attacks unfold—but building them by hand from threat data is time-consuming and error-prone. In this thesis, you will explore how to automatically derive attack trees from cyber threat data.
Drag and Drop Website Builder