Rational choice of security measures via multi-parameter attack trees
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Hi-index | 0.00 |
We have seen an explosion in the number of: conferences and workshops on all aspects of information security, topics studied in this field, and papers published. At the same time we have only seen a few widely deployed applications of this research. Meanwhile, computers are becoming less secure and criminals are exploiting new tricks. So, there is clearly a gap between theory and practice in information security. In this paper we analyze it and discuss the potential impacts of this gap.