Login / Signup
Ranking Attacks Based on Vulnerability Analysis.
Ju An Wang
Hao Wang
Minzhe Guo
Linfeng Zhou
Jairo Camargo
Published in:
HICSS (2010)
Keyphrases
</>
ranking algorithm
learning to rank
ranking functions
web search
countermeasures
malicious attacks
digital images
link analysis
rank aggregation
rank order
information systems
keyword search
ranked list
watermarking scheme
computer security
terrorist attacks