A representation of protocol attacks for risk assessment.
Catherine A. MeadowsPublished in: Network Threats (1996)
Keyphrases
- risk assessment
- risk management
- security protocols
- risk analysis
- cryptographic protocols
- network security
- risk factors
- economic impact
- information security
- lightweight
- machine learning
- emergency management
- neural network
- data processing
- databases
- fuzzy sets
- computational intelligence
- power plant
- artificial neural networks
- decision making
- data mining
- real world