Login / Signup
Boosting Logical Attack Graph for Efficient Security Control.
Zonghua Zhang
Shuzhen Wang
Published in:
ARES (2012)
Keyphrases
</>
attack graph
enterprise network
access control
anomaly detection
information security
intrusion detection
network management
security issues