Login / Signup
Towards a Taxonomy of Vulnerabilities.
Anil Bazaz
James D. Arthur
Published in:
HICSS (2007)
Keyphrases
</>
information security
countermeasures
security issues
security vulnerabilities
information technology
security mechanisms
hierarchically organized
attack graph
generalized association rules
information systems
image processing
multimedia
preprocessing
hierarchical structure