Integrating attacker behavior in IT security analysis: a discrete-event simulation approach

  • Andreas Ekelhart
  • , Elmar Kiesling
  • , Bernhard Grill
  • , Christine Strauss
  • , Christian Stummer

Publications: Contribution to journalArticlePeer Reviewed

Original languageEnglish
Pages (from-to)221-233
Number of pages13
JournalInformation Technology & Management
Volume16
Issue number3
Early online date11 Jun 2015
DOIs
Publication statusPublished - Sept 2015

Funding

The work presented in this paper was performed in the course of the research project "MOSES3" that is funded by the Austrian Science Fund (FWF) by Grant No. P23122-N23. The research was carried out at Secure Business Austria, a COMET K1 program competence center supported by FFG, the Austrian Research Promotion Agency.

Austrian Fields of Science 2012

  • 102016 IT security
  • 502050 Business informatics
  • 101015 Operations research
  • 502052 Business administration

Keywords

  • IT security
  • Modeling and simulation
  • Secure systems analysis and design
  • Attacker behavior
  • TREES
  • SYSTEMS
  • GRAPHS

Fingerprint

Dive into the research topics of 'Integrating attacker behavior in IT security analysis: a discrete-event simulation approach'. Together they form a unique fingerprint.

Cite this