| Original language | English |
|---|---|
| Pages (from-to) | 221-233 |
| Number of pages | 13 |
| Journal | Information Technology & Management |
| Volume | 16 |
| Issue number | 3 |
| Early online date | 11 Jun 2015 |
| DOIs | |
| Publication status | Published - Sept 2015 |
Funding
The work presented in this paper was performed in the course of the research project "MOSES3" that is funded by the Austrian Science Fund (FWF) by Grant No. P23122-N23. The research was carried out at Secure Business Austria, a COMET K1 program competence center supported by FFG, the Austrian Research Promotion Agency.
Austrian Fields of Science 2012
- 102016 IT security
- 502050 Business informatics
- 101015 Operations research
- 502052 Business administration
Keywords
- IT security
- Modeling and simulation
- Secure systems analysis and design
- Attacker behavior
- TREES
- SYSTEMS
- GRAPHS
Fingerprint
Dive into the research topics of 'Integrating attacker behavior in IT security analysis: a discrete-event simulation approach'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver