Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems.
Jaime AriasCarlos E. BuddeWojciech PenczekLaure PetrucciTeofil SidorukMariëlle StoelingaPublished in: ICFEM (2020)
Keyphrases
- multi agent systems
- penetration testing
- security vulnerabilities
- network security
- security measures
- cyber attacks
- key exchange protocol
- agent oriented
- denial of service attacks
- dos attacks
- information security
- countermeasures
- fault injection
- multi agent
- authentication mechanism
- malicious attacks
- encryption algorithm
- intrusion detection
- industrial automation
- key agreement
- security policies
- malicious users
- agent architecture
- security issues
- security risks
- decision trees
- authentication protocol
- security management
- cooperative
- access control
- security properties
- autonomous agents
- national security
- buffer overflow
- computer security
- agent systems
- statistical databases
- intelligent agents
- java card
- block cipher
- coalition formation
- security mechanisms
- security requirements
- attack scenarios
- defense mechanisms
- malicious nodes
- attack detection
- diffie hellman
- elliptic curve
- cyber security
- security protocols
- security analysis
- key management
- agent technology
- computer networks