Login / Signup
Relationships between vertex attack tolerance and other vulnerability parameters.
Vecdi Aytaç
Tufan Turaci
Published in:
RAIRO Theor. Informatics Appl. (2017)
Keyphrases
</>
parameter values
maximum likelihood
genetic algorithm
parameter space
input parameters
parameter selection
attack graphs
data sets
neural network
search engine
network security
detection mechanism
buffer overflow
penetration testing