Sign in

Simulating adversarial interactions between intruders and system administrators using OODA-RR.

Tim J. GrantH. S. VenterJan H. P. Eloff
Published in: SAICSIT (2007)
Keyphrases
  • network monitoring
  • network administrators
  • information systems
  • database systems
  • end users
  • mobile agents
  • interaction patterns