An Attack-Defense Tree on e-Exam System

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A genetic attack on the defense complex.

An increasing number of "non-model" organisms are becoming accessible to genetic analysis in the field, as evolutionary biologists develop dense molecular genetic maps. Peichel et al.'s recent study(1) provides a microsatellite-based map for threespine stickleback fish (Gasterosteus aculeatus), and the first evidence for QTL affecting feeding morphology and defensive armor. This species has und...

متن کامل

Trust on Web Browser: Attack vs. Defense

This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of Internet transaction. In this attack, when a client is misled to an attacker’s site, or an attacker hijacks a connection, a set of malicious HTML files are downloaded to the client’s machine. The files are used to crea...

متن کامل

Quantitative Questions on Attack-Defense Trees

Attack–defense trees are a novel methodology for graphical security modeling and assessment. The methodology includes visual, intuitive tree models whose analysis is supported by a rigorous mathematical formalism. Both, the intuitive and the formal components of the approach can be used for quantitative analysis of attack–defense scenarios. In practice, we use intuitive questions to ask about a...

متن کامل

Evaluation of Attributes on Attack–Defense Trees

Consequently, an ADTree has nodes of two opposite types: attack nodes and defense nodes. The root of an ADTree represents the main goal of the attacker. Every node of an ADTree may have one or more children of the same type representing a refinement into sub-goals of the node’s goal. The refinement of a node can be either disjunctive or conjunctive. The goal of a disjunctively refined node is a...

متن کامل

Network Attack and Defense

Whoever thinks his problem can be solved using cryptography, doesn't understand his problem and doesn't understand cryptography. If you spend more on coffee than on IT security, then you will be hacked. What's more, you deserve to be hacked. So far we've seen a large number of attacks against individual computers and other devices. But attacks increasingly depend on connectivity. Consider the f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Emerging Technologies in Learning (iJET)

سال: 2019

ISSN: 1863-0383

DOI: 10.3991/ijet.v14i23.11088