Login / Signup

Identifying a preferred countermeasure strategy for attack graphs.

Ganesh Ram SanthanamZachary J. OsterSamik Basu
Published in: CSIIRW (2013)
Keyphrases
  • attack graphs
  • attack graph
  • real time
  • optimal strategy
  • data mining
  • information security
  • countermeasures