Login / Signup

Vulnerability Modelling for the Analysis of Network Attacks.

Paolo MaggiDavide PozzaRiccardo Sisto
Published in: DepCoS-RELCOMEX (2008)
Keyphrases
  • data analysis
  • databases
  • intrusion detection
  • database systems
  • mobile devices
  • wireless sensor networks
  • text classification
  • data processing