Login / Signup
Experimental comparison of attack trees and misuse cases for security threat identification.
Andreas L. Opdahl
Guttorm Sindre
Published in:
Inf. Softw. Technol. (2009)
Keyphrases
</>
experimental comparison
countermeasures
feature selection
decision trees
tree structure
real time
database
machine learning
anomaly detection
tree structures
automatic identification
tree models