Login / Signup
ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration.
Mohammed Noraden Alsaleh
Ehab Al-Shaer
Ghaith Husari
Published in:
J. Netw. Syst. Manag. (2017)
Keyphrases
</>
network configuration
risk management
region of interest
attack graph
quality of service
neural network
information systems
decision support system
decision making
np hard
knowledge based systems
manufacturing systems