Login / Signup

Analyzing Enterprise Network Vulnerabilities.

Matunda NyanchamaMarc Stefaniu
Published in: Inf. Secur. J. A Glob. Perspect. (2003)
Keyphrases
  • enterprise network
  • attack graph
  • security issues
  • information security
  • cloud computing
  • network configuration
  • association rules
  • policy enforcement
  • real time
  • information systems
  • lightweight
  • ip addresses