Exploring risk flow attack graph for security risk assessment

F Dai, Y Hu, K Zheng, B Wu - IET Information Security, 2015 - Wiley Online Library
Researchers have previously looked into the problem of determining the connection
between invasive events and network risk, and attack graph (AG) was proposed to seek …

Risk-driven security testing using risk analysis with threat modeling approach

M Palanivel, K Selvadurai - SpringerPlus, 2014 - Springer
Security testing is a process of determining risks present in the system states and protects
them from vulnerabilities. But security testing does not provide due importance to threat …

[PDF][PDF] Conceptual framework for security testing, security risk analysis and their combinations

Y Li - 9th Workshop on Systems Testing and Validation …, 2012 - publica-rest.fraunhofer.de
Security testing and security risk analysis are key issues and central to strengthening the
ability of companies to face the new security challenges posed by the future internet. We …

Risk-Driven Security Assessment of Quadcopter's Flight Controller

DFCM Mendes - 2018 - search.proquest.com
Abstract Unmanned Aerial Vehicles (UAVs) are no longer exclusively military and scientific
solutions. These vehicles have been growing in popularity among hobbyist and also as …

[引用][C] Development Of Enhanced Models For Software Test Case Optimization Techniques

[引用][C] Motivation for security testing

M Khatri - Journal of Global Research in Computer Science, 2014

[引用][C] SOFTWARE SECURITY

A Divya - Journal of Global Research in Computer Science, 2015

[引用][C] of Deliverable

M Gonzalez - Journal On Advances in Intelligent Systems, 2012