Login / Signup
Probability of Attack Based on System Vulnerability Life Cycle.
Amontip Jumratjaroenvanit
Yunyong Teng-Amnuay
Published in:
ISECS (2008)
Keyphrases
</>
life cycle
attack graphs
metamodel
design process
business models
buffer overflow
attack graph
penetration testing
product design
software product
concurrent engineering
development life cycle
dynamic programming
probability distribution
service delivery
security vulnerabilities