An Attack-Defense Tree on e-Exam System
نویسندگان
چکیده
منابع مشابه
A genetic attack on the defense complex.
An increasing number of "non-model" organisms are becoming accessible to genetic analysis in the field, as evolutionary biologists develop dense molecular genetic maps. Peichel et al.'s recent study(1) provides a microsatellite-based map for threespine stickleback fish (Gasterosteus aculeatus), and the first evidence for QTL affecting feeding morphology and defensive armor. This species has und...
متن کاملTrust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of Internet transaction. In this attack, when a client is misled to an attacker’s site, or an attacker hijacks a connection, a set of malicious HTML files are downloaded to the client’s machine. The files are used to crea...
متن کاملQuantitative Questions on Attack-Defense Trees
Attack–defense trees are a novel methodology for graphical security modeling and assessment. The methodology includes visual, intuitive tree models whose analysis is supported by a rigorous mathematical formalism. Both, the intuitive and the formal components of the approach can be used for quantitative analysis of attack–defense scenarios. In practice, we use intuitive questions to ask about a...
متن کاملEvaluation of Attributes on Attack–Defense Trees
Consequently, an ADTree has nodes of two opposite types: attack nodes and defense nodes. The root of an ADTree represents the main goal of the attacker. Every node of an ADTree may have one or more children of the same type representing a refinement into sub-goals of the node’s goal. The refinement of a node can be either disjunctive or conjunctive. The goal of a disjunctively refined node is a...
متن کاملNetwork Attack and Defense
Whoever thinks his problem can be solved using cryptography, doesn't understand his problem and doesn't understand cryptography. If you spend more on coffee than on IT security, then you will be hacked. What's more, you deserve to be hacked. So far we've seen a large number of attacks against individual computers and other devices. But attacks increasingly depend on connectivity. Consider the f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Emerging Technologies in Learning (iJET)
سال: 2019
ISSN: 1863-0383
DOI: 10.3991/ijet.v14i23.11088