A survey on the usability and practical applications of Graphical Security Models

Computer Science Review, pp. 1-16, 2017.

Cited by: 4|Bibtex|Views9|Links
EI
Keywords:
Attack graphsAttack treesSecurity analysisSecurity metricsSecurity models

Abstract:

This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evalua...More

Code:

Data:

Your rating :
0

 

Tags
Comments