Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602].
Alyzia Maria KonstaAlberto Lluch-LafuenteBeatrice SpigaNicola DragoniPublished in: Comput. Secur. (2024)
Keyphrases
- attack graphs
- attack graph
- attack scenarios
- security vulnerabilities
- intrusion detection
- alert correlation
- attack detection
- intrusion detection system
- information security
- security measures
- dos attacks
- countermeasures
- network security
- network configuration
- access control
- computer security
- security requirements
- security properties
- security issues
- computer systems
- network administrators
- cyber security
- security management
- real time
- cyber attacks
- security policies