Login / Signup
Vulnerability Modelling for the Analysis of Network Attacks.
Paolo Maggi
Davide Pozza
Riccardo Sisto
Published in:
DepCoS-RELCOMEX (2008)
Keyphrases
</>
data analysis
databases
intrusion detection
database systems
mobile devices
wireless sensor networks
text classification
data processing