Login / Signup
A Catalog of Security Architecture Weaknesses.
Joanna C. S. Santos
Katy Tarrit
Mehdi Mirakhorli
Published in:
ICSA Workshops (2017)
Keyphrases
</>
security architecture
access control
security model
security policies
intrusion detection system
data integrity
simulation platform
security mechanisms
insider threat
data protection
computer systems