Attack patterns

In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security. Attack patterns… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will… (More)
  • figure 1
  • table III
  • table I
  • table II
  • figure 2
Is this relevant?
2014
2014
Testing for security related issues is an important task of growing interest due to the vast amount of applications and services… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Android’s security framework has been an appealing subject of research in the last few years. Android has been shown to be… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memoryless feature of the… (More)
  • figure 1
  • table 1
Is this relevant?
2010
2010
The anomaly and attack patterns using data mining have attracted in recent years. The social network anomaly and attack patterns… (More)
  • table I
  • figure I
  • table III
  • table II
  • figure IV
Is this relevant?
2007
2007
A pattern is an encapsulated solution to a problem in a given context that can be used to guide system design and evaluation… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
Honeypots are information system resources, whose value li es in unauthorized or illicit use of these resources. In this paper… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most memory corruption attacks and Internet worms follow a familiar pattern known as the control-data attack. Hence, many… (More)
  • figure 1
  • table 1
  • figure 2
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We consider a distributed approach to detect and to defend against the low-rate TCP attack (A. Kuzmanovic et al., August 2003… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?