Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,117,923 papers from all fields of science
Search
Sign In
Create Free Account
Attack patterns
In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security. Attack patterns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Authentication
Buffer overflow
Class diagram
Common Vulnerabilities and Exposures
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Detection of attacks based on known vulnerabilities in industrial networked systems
M. Cheminod
,
L. Durante
,
Lucia Seno
,
A. Valenzano
Journal of Information Security and Applications
2017
Corpus ID: 2722547
2012
2012
Automating Threat Modeling through the Software Development Life-Cycle
Guifré Ruiz
,
E. Heymann
,
Eduardo C´esar
,
B. Miller
2012
Corpus ID: 14252675
— Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software…
Expand
2011
2011
Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet
Markus Gruber
,
Florian Fankhauser
,
Stefan Taber
,
Christian Schanes
,
T. Grechenig
IEEE Third Int'l Conference on Privacy, Security…
2011
Corpus ID: 16024002
VoIP (Voice over IP) systems are more and more replacing PSTN (Public Switched Telephone Network) infrastructures. This increases…
Expand
2011
2011
Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis
Haitao Du
,
S. Yang
Social Computing, Behavioral Modeling, and…
2011
Corpus ID: 9589531
This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to…
Expand
Highly Cited
2010
Highly Cited
2010
MARS: Multi-stage Attack Recognition System
F. Alserhani
,
M. Akhlaq
,
I. Awan
,
A. J. Cullen
,
Pravin Mirchandani
24th IEEE International Conference on Advanced…
2010
Corpus ID: 14772375
Network Intrusion Detection Systems (NIDS) are considered as essential mechanisms to ensure reliable security. Intrusive model is…
Expand
2009
2009
A decision support system for constructing an alert classification model
Nien-Yi Jan
,
Shun-Chieh Lin
,
S. Tseng
,
Nancy P. Lin
Expert systems with applications
2009
Corpus ID: 28116540
Review
2009
Review
2009
Early Warning and Intrusion Detection based on Combined AI Methods
S. Edelkamp
,
C. Elfers
,
M. Horstmann
,
Marcus-Sebastian Schröder
,
K. Sohr
,
Thomas Wagner
2009
Corpus ID: 12613894
In this paper we survey the architecture and AI aspects in our project on early warningand intrusion detection based on combined…
Expand
2007
2007
A Novel Key Redistribution Scheme for Wireless Sensor Networks
C. Law
,
K. Hung
,
Yu-Kwong Kwok
IEEE International Conference on Communications
2007
Corpus ID: 1274141
Key management has long been a challenging problem in wireless distributed sensor networks (DSNs) due to their high security…
Expand
2007
2007
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
R. A. Miura-Ko
,
N. Bambos
IEEE International Conference on Communications
2007
Corpus ID: 23548348
In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems…
Expand
2004
2004
DENIAL OF SERVICE ATTACKS AND SIP INFRASTRUCTURE Attack Scenarios and Prevention Mechanisms
D. Sisalem
,
J. Kuthan
,
G. Schäfer
2004
Corpus ID: 17302015
In this paper we address the issue of denial of service (DoS) attacks targeting the hardware and software of voice over IP…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required