Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements.
Ethan HadarAmin HassanzadehPublished in: RE (2019)
Keyphrases
- security requirements
- big data analytics
- attack graphs
- requirements engineering
- attack graph
- big data
- social media
- smart card
- security analysis
- information security
- security policies
- security mechanisms
- software architecture
- security properties
- access control
- cyber security
- network configuration
- alert correlation
- network security
- attack scenarios
- real time
- information systems
- countermeasures
- business intelligence
- software development
- machine learning