Login / Signup
Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model.
Rattikorn Hewett
Phongphun Kijsanayothin
Published in:
Int. J. Netw. Secur. (2015)
Keyphrases
</>
network model
probabilistic model
computational model
high level
mathematical model
similarity measure
data mining
probability distribution
network structure
neural network model
formal model
power law