Login / Signup

A Protocol Vulnerability Analysis Method Based on Logical Attack Graph.

Chunrui ZhangShen WangDechen Zhan
Published in: IIH-MSP (2) (2017)
Keyphrases
  • objective function
  • cost function
  • expert systems