Exploring risk flow attack graph for security risk assessment
F Dai, Y Hu, K Zheng, B Wu - IET Information Security, 2015 - Wiley Online Library
Researchers have previously looked into the problem of determining the connection
between invasive events and network risk, and attack graph (AG) was proposed to seek …
between invasive events and network risk, and attack graph (AG) was proposed to seek …
Risk-driven security testing using risk analysis with threat modeling approach
M Palanivel, K Selvadurai - SpringerPlus, 2014 - Springer
Security testing is a process of determining risks present in the system states and protects
them from vulnerabilities. But security testing does not provide due importance to threat …
them from vulnerabilities. But security testing does not provide due importance to threat …
[PDF][PDF] Conceptual framework for security testing, security risk analysis and their combinations
Y Li - 9th Workshop on Systems Testing and Validation …, 2012 - publica-rest.fraunhofer.de
Security testing and security risk analysis are key issues and central to strengthening the
ability of companies to face the new security challenges posed by the future internet. We …
ability of companies to face the new security challenges posed by the future internet. We …
Risk-Driven Security Assessment of Quadcopter's Flight Controller
DFCM Mendes - 2018 - search.proquest.com
Abstract Unmanned Aerial Vehicles (UAVs) are no longer exclusively military and scientific
solutions. These vehicles have been growing in popularity among hobbyist and also as …
solutions. These vehicles have been growing in popularity among hobbyist and also as …
[引用][C] Development Of Enhanced Models For Software Test Case Optimization Techniques
P Maragathavalli - 2015