Login / Signup
Threat Modeling for Security Failure-Tolerant Requirements.
Michael E. Shin
Swetha Dorbala
Dongsoo Jang
Published in:
SocialCom (2013)
Keyphrases
</>
functional requirements
intrusion detection
information security
data mining
access control
modeling method
computer security
privacy issues
network security
user requirements
countermeasures
security properties
security measures
cyber crime
information assurance