Ivanova et al., 2015 - Google Patents
Attack tree generation by policy invalidationIvanova et al., 2015
View PDF- Document ID
- 18257794058151767693
- Author
- Ivanova M
- Probst C
- Hansen R
- Kammüller F
- Publication year
- Publication venue
- Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings 9
External Links
Snippet
Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems …
- 238000000034 method 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ivanova et al. | Attack tree generation by policy invalidation | |
Gupta et al. | Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges | |
Katsikeas et al. | An attack simulation language for the IT domain | |
Kordy et al. | On quantitative analysis of attack–defense trees with repeated labels | |
Beckers | Comparing privacy requirements engineering approaches | |
Khaled et al. | Assessing the severity of smart attacks in industrial cyber-physical systems | |
Antignac et al. | Privacy architectures: Reasoning about data minimisation and integrity | |
David et al. | Modelling social-technical attacks with timed automata | |
Kang et al. | Multi-representational security analysis | |
Apvrille et al. | SysML-Sec attack graphs: compact representations for complex attacks | |
Sen et al. | Application design phase risk assessment framework using cloud security domains | |
Liu et al. | A pattern language for blockchain governance | |
Makarova | Determining the choice of attack methods approach | |
Hacks et al. | Integrating security behavior into attack simulations | |
Li et al. | Faire: Repairing fairness of neural networks via neuron condition synthesis | |
Ali et al. | SRP: An efficient runtime protection framework for blockchain-based smart contracts | |
Crincoli et al. | Vulnerable smart contract detection by means of model checking | |
Mougouei et al. | A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems | |
Omotunde et al. | A hybrid threat model for software security requirement specification | |
Ndiaye et al. | Formal analysis of smart contracts: Model impact factor on criminality | |
Ouchani et al. | A meta language for cyber-physical systems and threats: Application on autonomous vehicle | |
Tan et al. | An AI blue team playbook | |
Laibinis et al. | A formal approach to identifying security vulnerabilities in telecommunication networks | |
Edwards et al. | On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics | |
Darwish et al. | A security testing framework for scrum based projects |