作者: Aleksandr Lenin , Jan Willemson , Dyan Permata Sari
DOI: 10.1007/978-3-319-11599-3_12
关键词: Attack tree 、 Adversarial system 、 Computer science 、 Security assessment 、 In real life 、 Face (geometry) 、 Data mining 、 Limiting 、 Boolean function 、 Profiling (computer programming) 、 Theoretical computer science
摘要: … ) are quantitative annotations on … quantitative security assessment, attack trees, and attacker profiling. Section 3 describes motivation for the attacker profiling in security risk assessment. …