Login / Signup
Identifying a preferred countermeasure strategy for attack graphs.
Ganesh Ram Santhanam
Zachary J. Oster
Samik Basu
Published in:
CSIIRW (2013)
Keyphrases
</>
attack graphs
attack graph
real time
optimal strategy
data mining
information security
countermeasures