Security attack analysis using attack patterns.
Tong LiElda PajaJohn MylopoulosJennifer HorkoffKristian BeckersPublished in: RCIS (2016)
Keyphrases
- forensic analysis
- security vulnerabilities
- authentication protocol
- denial of service attacks
- information systems
- key exchange protocol
- intrusion detection
- pattern analysis
- countermeasures
- cyber attacks
- penetration testing
- malicious attacks
- security measures
- security risks
- security protocols
- lightweight
- access control