Login / Signup
A new approach for network vulnerability analysis.
Hai Le Vu
Kenneth K. Khaw
Tsong Yueh Chen
Fei-Ching Kuo
Published in:
LCN (2008)
Keyphrases
</>
network model
computer networks
traffic analysis
complex networks
peer to peer
network traffic
databases
data sets
search algorithm
expert systems
network structure
decision trees
information systems
computer vision
real world
data flow
network resources