Login / Signup
Network vulnerability assessment using Bayesian networks.
Yu Liu
Hong Man
Published in:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2005)
Keyphrases
</>
bayesian networks
computer networks
network management
peer to peer
network traffic
communication networks
decision trees
wireless sensor networks
network structure
complex networks
risk assessment
neural network
probabilistic model
probabilistic reasoning
distributed network