Login / Signup
Security modeling and quantification of intrusion tolerant systems using attack-response graph.
Bharat B. Madan
Kishor S. Trivedi
Published in:
J. High Speed Networks (2004)
Keyphrases
</>
security measures
cyber attacks
security systems
intrusion detection
countermeasures
management system
database
case study
cloud computing
cost effective
rule based systems
secret key
authentication protocol