Login / Signup
Understanding vulnerabilities by refining taxonomy.
Nurul Haszeli Ahmad
Syed Ahmad Aljunid
Jamalul-lail Ab Manan
Published in:
IAS (2011)
Keyphrases
</>
information security
decision trees
data sets
information systems
website
similarity measure
evolutionary algorithm
hierarchical structure
countermeasures
hierarchically organized