Login / Signup
The cascade vulnerability problem.
Joseph D. Horton
Robert Harland
Elton Ashby
R. H. Cooper
W. F. Hyslop
Bradford G. Nickerson
W. M. Stewart
O. K. Ward
Published in:
IEEE Symposium on Security and Privacy (1993)
Keyphrases
</>
penetration testing
decision trees
data mining
social networks
multiresolution
risk assessment
haar features