Security threat assessment of an internet security system using attack tree and vague sets

HIGHLIGHTS

  • who: Attack Tree and collaborators from the Department of Management Sciences, ROC. Military Academy, Kaohsiung, Taiwan have published the research: Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets, in the Journal: (JOURNAL) of 21/Oct/2014
  • what: Construct the attack tree diagram by the AND node and OR node, tracing back the whole process from the main goal to the physical tasks. Of all, an attack tree is constructed that includes the main goal (the failure of the Internet security system during attack), the sub-goals (IP table, firewall . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?