Login / Signup
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions.
Luca Allodi
Sandro Etalle
Published in:
CoRR (2018)
Keyphrases
</>
countermeasures
information security
simplifying assumptions
attack graph
attack graphs
modeling method
real world
security risks
real time
neural network
web services