Login / Signup
Utilizing Attack Graphs to Measure the Efficacy of Security Frameworks across Multiple Applications.
Francis J. Manning
Frank J. Mitropoulos
Published in:
HICSS (2014)
Keyphrases
</>
attack graphs
attack graph
security vulnerabilities
information systems
access control
neural network
multistage
network management