Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentially endanger a system’s security.
CITATION STYLE
Ferreira, A., Huynen, J. L., Koenig, V., & Lenzini, G. (2015). In cyber-space no one can hear you s·CREAM: A root cause analysis for socio-technical security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9331, pp. 255–264). Springer Verlag. https://doi.org/10.1007/978-3-319-24858-5_16
Mendeley helps you to discover research relevant for your work.