Abstract
Existing research on systems security has focused on coding, providing little insight into how to create a secure architecture. Combining architectural analysis techniques based on tactics, patterns, and vulnerabilities will achieve the best outcomes.
| Original language | English (US) |
|---|---|
| Article number | 7349074 |
| Pages (from-to) | 52-59 |
| Number of pages | 8 |
| Journal | IEEE Security and Privacy |
| Volume | 13 |
| Issue number | 6 |
| DOIs | |
| State | Published - Nov 1 2015 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law