Login / Signup
Automated Risk Assessment for Sources and Targets of Vulnerability Exploitation.
Hassan Rasheed
Randy Y. C. Chow
Published in:
CSIE (1) (2009)
Keyphrases
</>
risk assessment
risk management
risk factors
risk analysis
decision making
information security
network security
economic impact
power plant
data sources
case study
intrusion detection
open source
genetic algorithm
machine learning
emergency management
evidence theory
situation assessment
neural network