Threat scenario-based security risk analysis using use case modeling in information systems.
Young-Gab KimSung Deok ChaPublished in: Secur. Commun. Networks (2012)
Keyphrases
- risk analysis
- information security
- information systems
- countermeasures
- risk assessment
- risk management
- decision making
- risk factors
- information technology
- influence diagrams
- critical infrastructure
- special case
- intrusion detection
- intelligent data analysis
- databases
- smart card
- fuzzy numbers
- network security
- access control
- object oriented
- requirements analysis
- expert systems