Security analysis of information systems taking into account social engineering attacks

I Kotenko, M Stepashkin… - 2011 19th International …, 2011 - ieeexplore.ieee.org
The paper suggests an attack trees based approach to security analysis of information
systems. The approach considers both software-technical and social engineering attacks. It …

Security Analysis of Information Systems Taking into Account Social Engineering Attacks

I Kotenko, M Stepashkin, E Doynikova - 19th Euromicro International …, 2011 - computer.org
The paper suggests an attack trees based approach to security analysis of information
systems. The approach considers both software-technical and social engineering attacks. It …

Security Analysis of Information Systems Taking into Account Social Engineering Attacks

I Kotenko, M Stepashkin, E Doynikova - Proceedings of the 2011 19th …, 2011 - dl.acm.org
The paper suggests an attack trees based approach to security analysis of information
systems. The approach considers both software-technical and social engineering attacks. It …

Security analysis of information systems taking into account social engineering attacks

I Kotenko, M Stepashkin, E Doynikova - Proceedings-19th International …, 2011 - elibrary.ru
The paper suggests an attack trees based approach to security analysis of information
systems. The approach considers both software-technical and social engineering attacks. It …

Security Analysis of Information Systems Taking into Account Social Engineering Attacks

I Kotenko, M Stepashkin, E Doynikova - 2011 19th International Euromicro … - infona.pl
The paper suggests an attack trees based approach to security analysis of information
systems. The approach considers both software-technical and social engineering attacks. It …