Cyber threat trees for large system threat cataloging and analysis

@article{Ongsakorn2010CyberTT,
  title={Cyber threat trees for large system threat cataloging and analysis},
  author={P. Ongsakorn and K. Turney and Mitchell A. Thornton and Suku Nair and Stephen Szygenda and Theodore W. Manikas},
  journal={2010 IEEE International Systems Conference},
  year={2010},
  pages={610-615}
}
The implementation of cyber threat countermeasures requires identification of points in a system where redundancy or other modifications are needed. Because large systems have many possible threats that may be interdependent, it is crucial that such threats be cataloged in a manner that allows for efficient representation and ease of analysis to identify… CONTINUE READING