2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2017
DOI: 10.1109/waina.2017.51
|View full text |Cite
|
Sign up to set email alerts
|

Security Oriented Malicious Activity Diagrams to Support Information Systems Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 3 publications
0
4
0
1
Order By: Relevance
“…Activity diagram dapat digunakan untuk menggambarkan bisnis dan operasional langkah demi langkah alur kerja komponen dalam sistem. Sebuah activity diagram dapat menunjukkan aliran kontrol keseluruhan [16]. Gambar 3 merupakan rangkaian aliran aktivitas dimulai ketika user membuka atau memulai menjalankan aplikasi, setelah itu sistem menampilkan halaman login.…”
Section: Activity Diagramunclassified
“…Activity diagram dapat digunakan untuk menggambarkan bisnis dan operasional langkah demi langkah alur kerja komponen dalam sistem. Sebuah activity diagram dapat menunjukkan aliran kontrol keseluruhan [16]. Gambar 3 merupakan rangkaian aliran aktivitas dimulai ketika user membuka atau memulai menjalankan aplikasi, setelah itu sistem menampilkan halaman login.…”
Section: Activity Diagramunclassified
“…The cost of threats removal or reducing threats late will be very high. It is a well-known fact that prevention is always better than cure [15].…”
Section: A Threatmentioning
confidence: 99%
“…This will guide the organization to be more concerned about the most critical assets as a priority. Assets are exposed to various threats [15].…”
Section: B Assetmentioning
confidence: 99%
See 2 more Smart Citations