Login / Signup
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering.
Wei Li
Rayford B. Vaughn
Published in:
HICSS (2006)
Keyphrases
</>
computer security
artificial intelligence
engineering design
data sets
access control
intrusion detection
information security
security requirements
security mechanisms
computer science
neural network
graph structure
weighted graph
graph partitioning
modeling method
database
security problems