Login / Signup
Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation.
Johan Sigholm
Emil Larsson
Published in:
MILCOM (2014)
Keyphrases
</>
cyber security
cyber crime
cyber physical
real time
data structure
utility function
cyber defense
multiscale
databases
search engine
decision trees
high level
expert systems
source code
power plant
cyber physical systems