A survey on the usability and practical applications of Graphical Security Models
Computer Science Review, pp. 1-16, 2017.
Attack graphsAttack treesSecurity analysisSecurity metricsSecurity models
This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evalua...More
Full Text (Upload PDF)
PPT (Upload PPT)