Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals Topics: Mobile Systems Security; Privacy Enhancing Technologies; Vulnerability Analysis and Countermeasures In Proceedings of the 4th International Conference on Information Systems Security and Privacy ICISSP - Volume 1, 494-502, 2018 , Funchal, Madeira, Portugal