Login / Signup
Matching attack patterns to security vulnerabilities in software-intensive system designs.
Michael Gegick
Laurie A. Williams
Published in:
ACM SIGSOFT Softw. Eng. Notes (2005)
Keyphrases
</>
security vulnerabilities
dos attacks
penetration testing
attack graphs
intrusion detection
security properties
attack graph
unauthorized access
lightweight
data mining techniques