Security Measurement for Unknown Threats Based on Attack Preferences.
Lihua YinYanwei SunZhen WangYunchuan GuoFenghua LiBinxing FangPublished in: Secur. Commun. Networks (2018)
Keyphrases
- security measures
- cyber attacks
- denial of service attacks
- countermeasures
- security vulnerabilities
- information security
- cyber security
- security breaches
- attack scenarios
- security management
- dos attacks
- security policies
- security issues
- computer security
- security threats
- security risks
- malicious attacks
- buffer overflow
- intrusion detection system
- key exchange protocol
- security services
- sql injection
- intrusion detection
- national security
- security mechanisms
- critical infrastructure
- network security
- user preferences
- insider attacks
- attack detection
- security problems
- anti virus
- security requirements
- security properties
- ddos attacks
- malicious users
- java card
- smart card
- fault injection
- data corruption
- cyber crime
- secret key
- smart grid
- security protocols
- key agreement
- block cipher
- malware detection
- access control