Analytical attack modeling and security assessment based on the common vulnerability scoring system.
Elena DoynikovaAndrey ChechulinIgor V. KotenkoPublished in: FRUCT (2017)
Keyphrases
- security vulnerabilities
- risk assessment
- security risks
- buffer overflow
- denial of service
- security measures
- cyber attacks
- information security
- network security
- penetration testing
- security problems
- denial of service attacks
- dos attacks
- countermeasures
- security requirements
- fault injection
- security policies
- attack graphs
- data security
- computer security
- key management
- malicious attacks
- security issues
- key exchange protocol
- key agreement