Login / Signup

Empirical risk assessment of attack graphs using time to compromise framework.

Urvashi GargGeeta SikkaLalit Kumar Awasthi
Published in: Int. J. Inf. Comput. Secur. (2021)
Keyphrases
  • risk assessment
  • network security
  • attack graphs
  • risk factors
  • risk analysis
  • network traffic
  • risk management