Compositional Approach to Quantify the Vulnerability of Computer Systems.
Hossein HomaeiHamid Reza ShahriariPublished in: Comput. J. (2011)
Keyphrases
- computer systems
- data processing
- operating system
- hardware and software
- information systems
- computing systems
- human beings
- computer security
- computer architecture
- communication systems
- information processing systems
- computer technology
- high end
- computer networks
- software developers
- intrusion detection system
- computer hardware
- user interface