Login / Signup

Matching attack patterns to security vulnerabilities in software-intensive system designs.

Michael GegickLaurie A. Williams
Published in: SESS@ICSE (2005)
Keyphrases
  • formal model
  • security vulnerabilities
  • security properties
  • penetration testing
  • attack graphs
  • intrusion detection
  • dos attacks
  • attack graph
  • unauthorized access
  • data mining techniques
  • access control
  • lightweight