Login / Signup
Scalable security analysis in hierarchical attack representation model using centrality measures.
Jin B. Hong
Dong Seong Kim
Published in:
DSN Workshops (2013)
Keyphrases
</>
security analysis
databases
security model