![DSpace logo](/jspui/image/logo.gif)
Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8395
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar, Rajesh | - |
dc.date.accessioned | 2023-01-09T08:56:56Z | - |
dc.date.available | 2023-01-09T08:56:56Z | - |
dc.date.issued | 2016-10 | - |
dc.identifier.uri | https://link.springer.com/chapter/10.1007/978-3-319-48393-1_24 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8395 | - |
dc.description.abstract | Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs. We capture the most dangerous multi-stage attack scenarios applicable to ATM structures, and establish a practical experience report, where we reflect on the process of modeling ATM threats via attack-defense trees. In particular, we share our insights into the benefits and drawbacks of attack-defense tree modeling, as well as best practices and lessons learned. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Attack-defense trees | en_US |
dc.subject | Security modeling | en_US |
dc.subject | ATM security | en_US |
dc.title | Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.