C Salter, OS Saydjari, B Schneier… - Proceedings of the 1998 …, 1998 - dl.acm.org
This paper presents a methodology for enumerating the vuinerabilities of a system, and
determining what countermeasures can best close those vulnerabilities. We first describe …