Login / Signup
Model-Based Analysis of Configuration Vulnerabilities.
C. R. Ramakrishnan
R. C. Sekar
Published in:
J. Comput. Secur. (2002)
Keyphrases
</>
information systems
information retrieval
image analysis
real time
databases
three dimensional
evolutionary algorithm
probabilistic model