Login / Signup

Combining Misuse Cases with Attack Trees and Security Activity Models.

Inger Anne TøndelJostein JensenLillian Røstad
Published in: ARES (2010)
Keyphrases
  • countermeasures
  • cyber attacks
  • probabilistic model
  • security policies
  • access control
  • tree models
  • malicious attacks