Login / Signup

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach.

Mukul GuptaJackie ReesAlok R. ChaturvediJie Chi
Published in: Decis. Support Syst. (2006)
Keyphrases
  • genetic algorithm
  • security vulnerabilities
  • information sharing
  • data mining
  • intrusion detection
  • network security