Login / Signup
Augmenting attack graphs to represent data link and network layer vulnerabilities.
Jaime C. Acosta
Edgar Padilla
John Homer
Published in:
MILCOM (2016)
Keyphrases
</>
data analysis
data mining techniques
computer systems
real time
data mining
knowledge discovery
data warehouse
data processing
network structure
security issues