A limited technical background is sufficient for attack-defense tree acceptabilityResearchers from LOCS presented at USENIX