Sign in

Visualizing Cyber Attacks with Misuse Case Maps.

Péter KárpátiGuttorm SindreAndreas L. Opdahl
Published in: REFSQ (2010)
Keyphrases
  • cyber attacks
  • countermeasures
  • intrusion detection system
  • intrusion detection
  • cyber security
  • computer systems
  • security policies
  • information systems
  • information visualization