Login / Signup

An Approach for Security Assessment of Network Configurations Using Attack Graph.

Nirnay GhoshSoumya K. Ghosh
Published in: NetCoM (2009)
Keyphrases