Login / Signup
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations.
Péter Kárpáti
Andreas L. Opdahl
Guttorm Sindre
Published in:
ARES (2011)
Keyphrases
</>
experimental comparison
security vulnerabilities
intrusion detection system
anomaly detection
intrusion detection
dos attacks
feature selection
countermeasures
network security
software architecture
penetration testing
network traffic
personal information
lightweight
computer systems
management system
database