Login / Signup

Experimental comparison of attack trees and misuse cases for security threat identification.

Andreas L. OpdahlGuttorm Sindre
Published in: Inf. Softw. Technol. (2009)
Keyphrases
  • experimental comparison
  • countermeasures
  • feature selection
  • decision trees
  • tree structure
  • real time
  • database
  • machine learning
  • anomaly detection
  • tree structures
  • automatic identification
  • tree models