Login / Signup
Exploiting attack-defense trees to find an optimal set of countermeasures.
Barbara Fila
Wojciech Widel
Published in:
CSF (2020)
Keyphrases
</>
countermeasures
information security
real world
decision trees
optimal solution
data analysis
network security
rural areas