Login / Signup
Combining Misuse Cases with Attack Trees and Security Activity Models.
Inger Anne Tøndel
Jostein Jensen
Lillian Røstad
Published in:
ARES (2010)
Keyphrases
</>
countermeasures
cyber attacks
probabilistic model
security policies
access control
tree models
malicious attacks