Login / Signup

Matching attack patterns to security vulnerabilities in software-intensive system designs.

Michael GegickLaurie A. Williams
Published in: ACM SIGSOFT Softw. Eng. Notes (2005)
Keyphrases
  • security vulnerabilities
  • dos attacks
  • penetration testing
  • attack graphs
  • intrusion detection
  • security properties
  • attack graph
  • unauthorized access
  • lightweight
  • data mining techniques