Login / Signup
Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries.
Jedidiah R. Crandall
Daniela Oliveira
Published in:
NSPW (2012)
Keyphrases
</>
information flows
information flow
high level
security vulnerabilities
attack graphs
emergency response
buffer overflow
computer assisted
information security
literature review
data mining
databases
security risks
social networks
temporal abstractions
organizational structure
team members
artificial intelligence