Login / Signup
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.
Péter Kárpáti
Guttorm Sindre
Raimundas Matulevicius
Published in:
Int. J. Secur. Softw. Eng. (2012)
Keyphrases
</>
software engineering
countermeasures
artificial intelligence
activity diagrams
anomaly detection
conceptual database design
database
knowledge representation
sequence diagrams