Yong Wang
information security, attack tree, risk assessment, vulnerability
In reviewing different security risk assessment methods, we developed a tree-based security assessment model based on vulnerability reports. Using an attack tree in a Unix login account as an example, we analyzed attack trees, resulting in experimental indication that the attack-tree-based risk assessment is more efficient than direct security risk assessment
Important Links:
Go Back