Login / Signup
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity.
Nitin Naik
Paul Grace
Paul Jenkins
Kshirasagar Naik
Jingping Song
Published in:
Comput. Secur. (2022)
Keyphrases
</>
countermeasures
three dimensional
decision making
security risks
attack detection
malicious users
data sets
neural network
recommender systems
range data
surface reconstruction
evaluation model
free form
binary tree
authentication protocol