Sign in

Scalable security analysis in hierarchical attack representation model using centrality measures.

Jin B. HongDong Seong Kim
Published in: DSN Workshops (2013)
Keyphrases
  • security analysis
  • databases
  • security model