HT Ray, R Vemuri, HR Kantubhukta - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
To better understand system vulnerabilities, proactive security services use red teams that
simulate malicious attacks. The authors contend that an attack model with UML-based use …