Developing Defense Strategies from Attack Probability Trees in Software Risk Assessment.
Marko EscheFederico Grasso ToroPublished in: FedCSIS (2020)
Keyphrases
- risk assessment
- network security
- risk management
- risk analysis
- risk factors
- information security
- computer networks
- decision making
- defense mechanisms
- evidence theory
- emergency management
- software development
- databases
- intrusion detection
- economic impact
- computer systems
- real time
- situation assessment
- anti virus
- metadata
- source code
- software systems
- power plant
- data mining
- neural network
- historical data
- case study
- development process
- intelligent systems