AvTA Based Assessment of Dependability Considering Recovery After Failures and Attacks on Vulnerabilities.
Vyacheslav S. KharchenkoYuriy PonochovnyiAl-Sudani Mustafa Qahtan AbdulmunemIryna ShulgaPublished in: IDAACS (2019)
Keyphrases
- data corruption
- countermeasures
- security flaws
- security vulnerabilities
- security risks
- failure recovery
- failure detection
- security mechanisms
- buffer overflow
- information security
- web services
- attack scenarios
- ambient intelligence
- denial of service
- image recovery
- malicious users
- security threats
- dos attacks
- ddos attacks
- computer security
- fault tolerance
- complex systems
- traffic analysis
- security problems
- malicious attacks
- terrorist attacks
- attack detection
- security issues
- watermarking scheme
- network security
- attack graphs
- access control