Dataset Open Access
Milan Lopuhaä-Zwakenberg
{ "description": "<p>Code and data corresponding to the paper "Attack time analysis in dynamic attack trees via integer linear programming"</p>", "license": "https://creativecommons.org/licenses/by/4.0/legalcode", "creator": [ { "affiliation": "University of Twente", "@type": "Person", "name": "Milan Lopuha\u00e4-Zwakenberg" } ], "url": "https://zenodo.org/record/5541760", "datePublished": "2021-09-30", "@context": "https://schema.org/", "distribution": [ { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/bigDAT.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/BUDAT.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Combine_BAS.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Combine_noTree.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Combine_Tree.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Data.mat", "encodingFormat": "mat", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/DAT_milp.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/DAT_naive.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/DAT_semismart.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/DAT_smart.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/DFLMT.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/IsSPO.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Modules.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Prune.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Scorer.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/tbxmanager.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Tester.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/TransClose.m", "encodingFormat": "m", "@type": "DataDownload" }, { "contentUrl": "https://zenodo.org/api/files/5bd4283c-f7d4-4525-8e89-78e5bdd6d871/Treetimer.m", "encodingFormat": "m", "@type": "DataDownload" } ], "identifier": "https://doi.org/10.5281/zenodo.5541760", "@id": "https://doi.org/10.5281/zenodo.5541760", "@type": "Dataset", "name": "Attack time analysis in dynamic attack trees via integer linear programming" }
All versions | This version | |
---|---|---|
Views | 115 | 115 |
Downloads | 154 | 154 |
Data volume | 21.6 MB | 21.6 MB |
Unique views | 108 | 108 |
Unique downloads | 82 | 82 |