Login / Signup
Considering temporal and environmental characteristics of vulnerabilities in network security risk assessment.
Masoud Khosravi Farmad
Razieh Rezaee
Abbas Ghaemi Bafghi
Published in:
ISCISC (2014)
Keyphrases
</>
network structure
computer networks
peer to peer
buffer overflow
emergency management
real time
data mining
management system
decision support system
intelligent systems
data collection
complex networks