Login / Signup
Network Security: Vulnerabilities and Disclosure Policy.
Jay Pil Choi
Chaim Fershtman
Neil Gandal
Published in:
WEIS (2007)
Keyphrases
</>
security vulnerabilities
attack graphs
wireless sensor networks
intrusion detection
dos attacks
attack graph
network management
database
data quality