|
Volumn , Issue , 2005, Pages
|
Matching attack patterns to security vulnerabilities in software-intensive system designs
|
Author keywords
Design; Regular expression; Security
|
Indexed keywords
APPLICATION PROGRAMS;
DESIGN;
SECURITY OF DATA;
STUDENTS;
SYSTEMS ANALYSIS;
ABSTRACT REPRESENTATION;
REGULAR EXPRESSIONS;
SECURITY;
SECURITY VULNERABILITIES;
SOFTWARE DEVELOPMENT PROCESS;
SOFTWARE INTENSIVE SYSTEMS;
SOFTWARE VULNERABILITIES;
VULNERABILITY DATABASE;
SOFTWARE DESIGN;
|
EID: 85085406935
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1083200.1083211 Document Type: Conference Paper |
Times cited : (33)
|
References (19)
|