Skip to main content

Showing 1–4 of 4 results for author: Schiele, N D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.02499  [pdf, other

    cs.CR

    Attack Tree Distance: a practical examination of tree difference measurement within cyber security

    Authors: Nathan D. Schiele, Olga Gadyatskaya

    Abstract: CONTEXT. Attack treesare a recommended threat modeling tool, but there is no established method to compare them. OBJECTIVE. We aim to establish a method to compare "real" attack trees, based on both the structure of the tree itself and the meaning of the node labels. METHOD. We define four methods of comparison (three novel and one established) and compare them to a dataset of attack trees created… ▽ More

    Submitted 4 March, 2025; originally announced March 2025.

    Comments: This is an incomplete draft that was stolen and plagiarized. When a completed version is finished, it will be published as a version 2 here on arxiv

  2. arXiv:2502.11920  [pdf, other

    cs.CR

    A limited technical background is sufficient for attack-defense tree acceptability

    Authors: Nathan Daniel Schiele, Olga Gadyatskaya

    Abstract: Attack-defense trees (ADTs) are a prominent graphical threat modeling method that is highly recommended for analyzing and communicating security-related information. Despite this, existing empirical studies of attack trees have established their acceptability only for users with highly technical (computer science) backgrounds while raising questions about their suitability for threat modeling stak… ▽ More

    Submitted 29 March, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

  3. arXiv:2208.04458  [pdf, other

    cs.HC

    Comparative Evaluation of Bipartite, Node-Link, and Matrix-Based Network Representations

    Authors: Moataz Abdelaal, Nathan D. Schiele, Katrin Angerbauer, Kuno Kurzhals, Michael Sedlmair, Daniel Weiskopf

    Abstract: This work investigates and compares the performance of node-link diagrams, adjacency matrices, and bipartite layouts for visualizing networks. In a crowd-sourced user study (n = 150), we measure the task accuracy and completion time of the three representations for different network classes and properties. In contrast to the literature, which covers mostly topology-based tasks (e.g., path finding)… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: 11 pages, 7 figures, IEEE VIS 2022 Conference, Preprint

  4. arXiv:2110.02553  [pdf, ps, other

    cs.CR

    A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version

    Authors: Nathan Daniel Schiele, Olga Gadyatskaya

    Abstract: Attack trees and attack graphs are both common graphical threat models used by organizations to better understand possible cybersecurity threats. These models have been primarily seen as separate entities, to be used and researched in entirely different contexts, but recently there has emerged a new interest in combining the strengths of these models and in transforming models from one notation in… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: 20 pages, 7 figures, Shortened version to be published CRiSIS 2021