Sign in

Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.

Péter KárpátiGuttorm SindreRaimundas Matulevicius
Published in: Int. J. Secur. Softw. Eng. (2012)
Keyphrases
  • software engineering
  • countermeasures
  • artificial intelligence
  • activity diagrams
  • anomaly detection
  • conceptual database design
  • database
  • knowledge representation
  • sequence diagrams