Sign in

Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities.

Urvashi GargGeeta SikkaLalit Kumar Awasthi
Published in: Comput. Secur. (2018)
Keyphrases