Jenab, Kouroush; Khoury, Sam; LaFevor, Kim - In: International Journal of Enterprise Information Systems … 12 (2016) 1, pp. 59-84
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal …, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated …. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and …