Attack Tree를 활용한 Game Theory 기반 보안 취약점 정량화 기법
Vol. 27, No. 2, pp. 259-266,
4월.
2017
10.13089/JKIISC.2017.27.2.259,
Full Text:
Keywords: game theory, Attack tree, Vulnerability Quantification
Abstract Statistics
Cite this article


Keywords: game theory, Attack tree, Vulnerability Quantification
Abstract Statistics
Cite this article
[IEEE Style]
S. Lee, S. Lee, T. Shon, "Game Theory-Based Vulnerability Quantification Method Using Attack Tree," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 2, pp. 259-266, 2017. DOI: 10.13089/JKIISC.2017.27.2.259.
[ACM Style]
Seokcheol Lee, Sang-Ha Lee, and Taeshik Shon. 2017. Game Theory-Based Vulnerability Quantification Method Using Attack Tree. Journal of The Korea Institute of Information Security and Cryptology, 27, 2, (2017), 259-266. DOI: 10.13089/JKIISC.2017.27.2.259.