Login / Signup
An Approach To A Graph-Based Active Cyber Defense Model.
Yosra Lakhdhar
Slim Rekhis
Noureddine Boudriga
Published in:
MoMM (2016)
Keyphrases
</>
sensitivity analysis
influence diagrams
data analysis
information security