Managing infrastructure vulnerability: An empirical study on the use of performance management systems that seek to reduce vulnerability of network industries.
Hans de BruijnMark de BruijneBauke SteenhuisenPublished in: ISTAS (2007)
Keyphrases
- buffer overflow
- management system
- attack graphs
- attack graph
- complex networks
- network structure
- risk assessment
- security risks
- network traffic
- computer networks
- network management
- computing platform
- personal communication
- peer to peer
- information technology
- database management systems
- information dissemination
- network infrastructure