Login / Signup

Exploiting attack-defense trees to find an optimal set of countermeasures.

Barbara FilaWojciech Widel
Published in: CSF (2020)
Keyphrases
  • countermeasures
  • information security
  • real world
  • decision trees
  • optimal solution
  • data analysis
  • network security
  • rural areas