Risk assessment of code injection vulnerabilities using fuzzy logic-based system.
Hossain ShahriarHisham HaddadPublished in: SAC (2014)
Keyphrases
- risk assessment
- information security
- risk management
- network security
- risk analysis
- fuzzy logic
- risk factors
- decision making
- emergency management
- source code
- security issues
- intrusion detection
- economic impact
- information systems
- fuzzy rules
- real time
- power consumption
- software systems
- data processing
- decision support system
- real world
- databases