Event-driven architecture based on patterns for detecting complex attacks
International Journal of Critical Computer-Based Systems
Information Systems Research
Hi-index | 0.00 |
On a recent project, the authors found informal attack graphs were helpful in the iterative design of a system used to protect sensitive data at a customer site. In this article, they use a snippet from the project's design to illustrate the value of using attack graphs in a secure software development life cycle.