Research Article
A Minimum Defense Cost Calculation Method for Attack Defense Trees
Table 2
The meaning of each node in Figure
4.
| Node label | Meaning |
| UG | Bank account | M1 | ATM | M2 | Online | M3 | PIN | M4 | Password | A1 | Card | A2 | Username | A3 | Eavesdropping | A4 | Find note | A5 | Phishing | A6 | Keylogger | D1 | Face recognition | D2 | Report loss | D3 | Two-factor authentication | D4 | Periodic inspection | D5 | Memorization | D6 | Server-side filtering | D7 | Antivirus software |
|
|