Login / Signup
Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study.
Gencer Erdogan
Ketil Stølen
Jan Øyvind Aagedal
Published in:
ICISSP (2016)
Keyphrases
</>
risk assessment
risk analysis
information security
database
security level
risk factors
risk management
statistical databases
evaluation method
security problems
security requirements
security issues
evaluation model
network security
intrusion detection
anomaly detection
data driven
decision making
data mining