Login / Signup
Modeling discovery and removal of security vulnerabilities in software system using priority queueing models.
Dae-Eun Lim
Tae-Sung Kim
Published in:
J. Comput. Virol. Hacking Tech. (2014)
Keyphrases
</>
security vulnerabilities
stochastic models
queueing model
steady state
intrusion detection
dos attacks
modeling language
knowledge discovery
software development
computer systems
software systems
arrival rate
network security
unauthorized access
security properties
data mining
reinforcement learning