Login / Signup

Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.

Igor V. KotenkoElena Doynikova
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2014)
Keyphrases