메뉴 건너뛰기




Volumn 5, Issue 2-3, 2010, Pages 87-95

Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees

Author keywords

Attack modelling; Attack trees; Computer security; Metrics; Protection modelling; Protection trees; Radio frequency identification (RFID) security; Risk

Indexed keywords

FORESTRY; NETWORK SECURITY; RADIO WAVES; RISK ANALYSIS; RISK ASSESSMENT; RISKS; SECURITY OF DATA;

EID: 77949692385     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2010.032207     Document Type: Article
Times cited : (14)

References (18)
  • 8
    • 77949700837 scopus 로고    scopus 로고
    • Chaos Communication Camp, 8-12 August, Finowfurt Germany
    • Meriac, M. and Plotz, H. (2007) Practical RFID Attacks, Chaos Communication Camp, 8-12 August, Finowfurt Germany.
    • (2007) Practical RFID Attacks
    • Meriac, M.1    Plotz, H.2
  • 11
    • 33845921799 scopus 로고    scopus 로고
    • Attack trees: It's a jungle out there - Seeing your system through a Hacker's eyes
    • Pallos, M. (2004) 'Attack trees: it's a jungle out there - seeing your system through a Hacker's eyes', WebSphere Online Journal, Vol.3, pp.12-14.
    • (2004) WebSphere Online Journal , vol.3 , pp. 12-14
    • Pallos, M.1
  • 14
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modelling security threats
    • Schneier, B. (1999) 'Attack trees: modelling security threats', Dr. Dobb's Journal, Vol.24, pp.21-29.
    • (1999) Dr Dobb's Journal , vol.24 , pp. 21-29
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.