Login / Signup

Cyber-Attack Modeling Analysis Techniques: An Overview.

Hamad Al-MohannadiQublai Khan Ali MirzaAnitta Patience NamanyaIrfan AwanAndrea J. CullenJules Pagna Disso
Published in: FiCloud Workshops (2016)
Keyphrases
  • computational intelligence
  • resource constrained
  • risk analysis