Computer network threat modelling

9Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The paper discusses methods for constructing threat models of information systems and computer networks. The disadvantages of existing approaches are highlighted. The authors propose an approach to building a computer network model, as well as describing threats to information and the system. The proposed approach takes into account the identified shortcomings of existing solutions and is aimed at reducing the impact of the subjective opinion of an expert when compiling lists of threats.

Cite

CITATION STYLE

APA

Novokhrestov, A., Konev, A., Shelupanov, A., & Buymov, A. (2020). Computer network threat modelling. In Journal of Physics: Conference Series (Vol. 1488). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1488/1/012002

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free