Login / Signup

The cascade vulnerability problem.

Joseph D. HortonRobert HarlandElton AshbyR. H. CooperW. F. HyslopBradford G. NickersonW. M. StewartO. K. Ward
Published in: IEEE Symposium on Security and Privacy (1993)
Keyphrases
  • penetration testing
  • decision trees
  • data mining
  • social networks
  • multiresolution
  • risk assessment
  • haar features