Login / Signup
Personal workstation automation security vulnerabilities.
James A. Schweitzer
Published in:
Comput. Secur. (1984)
Keyphrases
</>
security vulnerabilities
intrusion detection
dos attacks
penetration testing
security properties
intrusion detection system
personal information
data mining
database
attack graphs