Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems.
Jaime AriasCarlos E. BuddeWojciech PenczekLaure PetrucciMariëlle StoelingaPublished in: CoRR (2019)
Keyphrases
- multi agent systems
- penetration testing
- security vulnerabilities
- network security
- security measures
- cyber attacks
- agent oriented
- information security
- key exchange protocol
- countermeasures
- denial of service attacks
- authentication protocol
- dos attacks
- fault injection
- access control
- national security
- security requirements
- decision trees
- intrusion detection
- malicious users
- security issues
- authentication mechanism
- cyber security
- agent systems
- security policies
- intrusion detection system
- key agreement
- security properties
- computer security
- industrial automation
- information leakage
- attack scenarios
- malicious attacks
- multi agent
- security risks
- security management
- security threats
- encryption algorithm
- agent technology
- block cipher
- forensic analysis
- intelligent agents
- malicious activities
- smart card
- defense mechanisms
- autonomous agents
- buffer overflow
- agent architecture
- trust model
- data encryption
- key management
- security protocols
- ddos attacks
- java card
- diffie hellman
- trust relationships