Login / Signup
Scenario Graphs Applied to Security (Extended Abstract).
Jeannette M. Wing
Published in:
VISSAS (2005)
Keyphrases
</>
extended abstract
real world
intrusion detection
database
real time
data sets
access control
directed graph
graph model
security issues
security mechanisms
random graphs