Login / Signup

Boosting Logical Attack Graph for Efficient Security Control.

Zonghua ZhangShuzhen Wang
Published in: ARES (2012)
Keyphrases
  • attack graph
  • enterprise network
  • access control
  • anomaly detection
  • information security
  • intrusion detection
  • network management
  • security issues