Login / Signup

Augmenting attack graphs to represent data link and network layer vulnerabilities.

Jaime C. AcostaEdgar PadillaJohn Homer
Published in: MILCOM (2016)
Keyphrases
  • data analysis
  • data mining techniques
  • computer systems
  • real time
  • data mining
  • knowledge discovery
  • data warehouse
  • data processing
  • network structure
  • security issues