Modeling Attack-Defense Trees' Countermeasures Using Continuous Time Markov Chains.
Karim LounisSamir OuchaniPublished in: SEFM (2020)
Keyphrases
- countermeasures
- defense mechanisms
- information security
- power analysis
- information warfare
- cyber attacks
- security measures
- java card
- intrusion detection
- differential power analysis
- markov processes
- network security
- continuous time markov chains
- databases
- security policies
- poisson distribution
- smart card
- steady state