Login / Signup
Analyzing Enterprise Network Vulnerabilities.
Matunda Nyanchama
Marc Stefaniu
Published in:
Inf. Secur. J. A Glob. Perspect. (2003)
Keyphrases
</>
enterprise network
attack graph
security issues
information security
cloud computing
network configuration
association rules
policy enforcement
real time
information systems
lightweight
ip addresses