Login / Signup

Considering temporal and environmental characteristics of vulnerabilities in network security risk assessment.

Masoud Khosravi FarmadRazieh RezaeeAbbas Ghaemi Bafghi
Published in: ISCISC (2014)
Keyphrases
  • network structure
  • computer networks
  • peer to peer
  • buffer overflow
  • emergency management
  • real time
  • data mining
  • management system
  • decision support system
  • intelligent systems
  • data collection
  • complex networks