Publication | Closed Access
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach
20
Citations
19
References
2015
Year
Security ModellingAttack SimulationEngineeringInformation SecurityIt Security AnalysisDiscrete-event Simulation ApproachComputer EngineeringSecuritySoftware EngineeringSystems EngineeringSecurity EvaluationComputer ScienceAttacker BehaviorSoftware AnalysisThreat ModelComputer Security ModelData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1