[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ivanova et al., 2015 - Google Patents

Attack tree generation by policy invalidation

Ivanova et al., 2015

View PDF
Document ID
18257794058151767693
Author
Ivanova M
Probst C
Hansen R
Kammüller F
Publication year
Publication venue
Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings 9

External Links

Snippet

Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems …
Continue reading at inria.hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models

Similar Documents

Publication Publication Date Title
Ivanova et al. Attack tree generation by policy invalidation
Gupta et al. Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges
Katsikeas et al. An attack simulation language for the IT domain
Kordy et al. On quantitative analysis of attack–defense trees with repeated labels
Beckers Comparing privacy requirements engineering approaches
Khaled et al. Assessing the severity of smart attacks in industrial cyber-physical systems
Antignac et al. Privacy architectures: Reasoning about data minimisation and integrity
David et al. Modelling social-technical attacks with timed automata
Kang et al. Multi-representational security analysis
Apvrille et al. SysML-Sec attack graphs: compact representations for complex attacks
Sen et al. Application design phase risk assessment framework using cloud security domains
Liu et al. A pattern language for blockchain governance
Makarova Determining the choice of attack methods approach
Hacks et al. Integrating security behavior into attack simulations
Li et al. Faire: Repairing fairness of neural networks via neuron condition synthesis
Ali et al. SRP: An efficient runtime protection framework for blockchain-based smart contracts
Crincoli et al. Vulnerable smart contract detection by means of model checking
Mougouei et al. A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems
Omotunde et al. A hybrid threat model for software security requirement specification
Ndiaye et al. Formal analysis of smart contracts: Model impact factor on criminality
Ouchani et al. A meta language for cyber-physical systems and threats: Application on autonomous vehicle
Tan et al. An AI blue team playbook
Laibinis et al. A formal approach to identifying security vulnerabilities in telecommunication networks
Edwards et al. On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics
Darwish et al. A security testing framework for scrum based projects