Sign in

A Robustness Testing Method for Network Security.

Yulong FuOusmane Koné
Published in: ICGS3/e-Democracy (2011)
Keyphrases
  • network security
  • real time
  • real world
  • databases
  • information technology
  • probabilistic model