• Model the system security risk by an Attack Tree 

        Contributor:Poolsappasit, Nayot; Edwards, John; Ray, Indrajit;
        Date:2006
        Traditional Vulnerabilities scanners only give a list of vulnerabilities of the systems. This one dimensional information does not give analysts the perception of how exploits can be chained together and form more complex ...