Login / Signup

Understanding vulnerabilities by refining taxonomy.

Nurul Haszeli AhmadSyed Ahmad AljunidJamalul-lail Ab Manan
Published in: IAS (2011)
Keyphrases
  • information security
  • decision trees
  • data sets
  • information systems
  • website
  • similarity measure
  • evolutionary algorithm
  • hierarchical structure
  • countermeasures
  • hierarchically organized