2014 article

On Coverage-Based Attack Profiles

Rivers, A. T., Vouk, M. A., & Williams, L. A. (2014, June 1).

By: A. Rivers n, M. Vouk n & L. Williams n

author keywords: security; coverage; models; attack; profile
topics (OpenAlex): Software Engineering Research; Software Reliability and Analysis Research; Simulation Techniques and Applications
TL;DR: A hypergeometric process model is presented that describes automated cyber attacks and web request signatures from the logs of a production web server were used to assess the applicability of the model. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.