Login / Signup

On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment.

Katsiaryna LabunetsFabio MassacciFederica Paci
Published in: REFSQ (2017)
Keyphrases
  • automatic recognition
  • data collection
  • soft computing