Login / Signup
Simulating adversarial interactions between intruders and system administrators using OODA-RR.
Tim J. Grant
H. S. Venter
Jan H. P. Eloff
Published in:
SAICSIT (2007)
Keyphrases
</>
network monitoring
network administrators
information systems
database systems
end users
mobile agents
interaction patterns