Login / Signup

Developing Abuse Cases Based on Threat Modeling and Attack Patterns.

Xiaohong YuanEmmanuel Borkor NuakohImano WilliamsHuiming Yu
Published in: J. Softw. (2015)
Keyphrases
  • countermeasures
  • data mining techniques
  • real time
  • design patterns
  • software engineering
  • pattern analysis
  • modeling framework
  • previously unknown
  • pattern extraction
  • sir model