Login / Signup
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.
Igor V. Kotenko
Elena Doynikova
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2014)
Keyphrases
</>
computer network security
event processing
attack graphs
security vulnerabilities
network security
neural network
complex event processing
complex events
computer networks
information security
databases
security issues
stream processing
security policies
access control
attack scenarios
association rules