Login / Signup
Towards an efficient verification approach on network configuration.
Khalid Elbadawi
Yongning Tang
James T. Yu
Published in:
CNSM (2012)
Keyphrases
</>
network configuration
attack graph
bayesian networks
neural network
quality of service
planning horizon