Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Sihn Hye | - |
dc.contributor.author | Kim, Dongyoon | - |
dc.contributor.author | Lee, Seok Won | - |
dc.date.issued | 2023-01-01 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36980 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85174387766&origin=inward | - |
dc.description.abstract | Advanced Persistent Threat (APT) attacks are complex, employing diverse attack elements and increasingly intelligent techniques. This paper introduces a tool for security risk assessment specifically designed for these attacks. This tool assists security teams in systematically analyzing APT attacks to derive adaptive security requirements for mission-critical target systems. Additionally, the tool facilitates the assessment of security risks, providing a comprehensive understanding of their impact on target systems. By leveraging this tool, security teams can enhance defense strategies, mitigating potential threats and ensuring the security of target systems. | - |
dc.description.sponsorship | This work ' 'was supported \\ 3 by the CBK21 (+* ?FOUR 0& program \ of the /National Research ?Foundation of (Korea funded 3by the 8 Ministry of Education 1/(NRF5?=*FF1999FF*G*<910140GF*91) 2and the \u03b1Institute of \u03b1Information 9& .Communications Technology Planning 9& Evaluation 1\u03b1(IITP) \u03b1 2 under the Artificial \u03b1Intelligence .Convergence \u03b1Innovation Human Resources !Devel \opment 1(IITP\u03b1\u03b1 +-2023-RS-G+: +G2023-00255968) +: GG+==F>H2 grant funded 3by (Korea 18 (MSIT). \u03b1 2# | - |
dc.language.iso | eng | - |
dc.publisher | IEEE Computer Society | - |
dc.subject.mesh | Adaptive security | - |
dc.subject.mesh | Adaptive security requirement | - |
dc.subject.mesh | Advanced persistent threat | - |
dc.subject.mesh | Attacks scenarios | - |
dc.subject.mesh | Domain ontologies | - |
dc.subject.mesh | Evidence-driven risk assessment | - |
dc.subject.mesh | Problem domain | - |
dc.subject.mesh | Risk aware | - |
dc.subject.mesh | Risk-aware problem domain ontology | - |
dc.subject.mesh | Risks assessments | - |
dc.subject.mesh | Security requirements | - |
dc.title | A Tool for Security Risk Assessment for APT Attacks: using Scenarios, Security Requirements, and Evidence | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2023.9.4. ~ 2023.9.8. | - |
dc.citation.conferenceName | 31st IEEE International Requirements Engineering Conference, RE 2023 | - |
dc.citation.edition | Proceedings - 31st IEEE International Requirements Engineering Conference, RE 2023 | - |
dc.citation.endPage | 364 | - |
dc.citation.startPage | 363 | - |
dc.citation.title | Proceedings of the IEEE International Conference on Requirements Engineering | - |
dc.citation.volume | 2023-September | - |
dc.identifier.bibliographicCitation | Proceedings of the IEEE International Conference on Requirements Engineering, Vol.2023-September, pp.363-364 | - |
dc.identifier.doi | 10.1109/re57278.2023.00053 | - |
dc.identifier.scopusid | 2-s2.0-85174387766 | - |
dc.subject.keyword | adaptive security requirements | - |
dc.subject.keyword | advanced persistent threat | - |
dc.subject.keyword | attack scenario | - |
dc.subject.keyword | evidence-driven risk assessment | - |
dc.subject.keyword | risk-aware problem domain ontology | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Computer Science (all) | - |
dc.subject.subarea | Engineering (all) | - |
dc.subject.subarea | Strategy and Management | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.