Integrating Security Behavior into Attack Simulations.
Simon HacksIsmail ButunRobert LagerströmAndrei BuhaiuAnna GeorgiadouAriadni Michalitsi-PsarrouPublished in: ARES (2021)
Keyphrases
- security measures
- information security
- key exchange protocol
- fault injection
- countermeasures
- cyber attacks
- intrusion detection
- security vulnerabilities
- network security
- security requirements
- authentication protocol
- denial of service attacks
- smart card
- malicious users
- security risks
- encryption algorithm
- dos attacks
- security analysis
- key agreement
- normal behavior
- malicious attacks
- attack detection
- digital watermark
- denial of service
- key management
- statistical databases