Unified modeling of attacks, vulnerabilities and security activities.
David ByersNahid ShahmehriPublished in: SESS@ICSE (2010)
Keyphrases
- security vulnerabilities
- security mechanisms
- security risks
- information security
- security issues
- countermeasures
- security flaws
- security breaches
- security threats
- buffer overflow
- malicious activities
- security problems
- network security
- computer security
- security measures
- intrusion detection
- dos attacks
- security protocols
- denial of service
- java card
- security requirements
- cyber attacks
- access control
- cryptographic protocols
- stream cipher
- resource constrained
- intrusion detection system
- denial of service attacks
- chosen plaintext
- attack scenarios
- security properties
- key management
- smart card
- security patterns
- malicious users
- fault injection
- cyber security
- smart grid
- watermarking scheme
- sql injection
- intrusion prevention
- information systems