A methodology for testing virtualisation security.
Scott DonaldsonNatalie CoullDavid McLuskiePublished in: CyberSA (2017)
Keyphrases
- information security
- access control
- real time
- neural network
- test cases
- fault injection
- security systems
- security requirements
- control system
- network security
- security properties
- security analysis
- model based testing
- database
- security vulnerabilities
- data integrity
- computer security
- functional requirements
- software testing
- security issues
- software architecture
- test data
- databases