Login / Signup
Matching attack patterns to security vulnerabilities in software-intensive system designs.
Michael Gegick
Laurie A. Williams
Published in:
SESS@ICSE (2005)
Keyphrases
</>
formal model
security vulnerabilities
security properties
penetration testing
attack graphs
intrusion detection
dos attacks
attack graph
unauthorized access
data mining techniques
access control
lightweight