Login / Signup
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict.
Christian Czosseck
Karlis Podins
Published in:
Int. J. Cyber Warf. Terror. (2012)
Keyphrases
</>
computational model
database
decision trees
data mining
high level
objective function
prior knowledge
experimental data
data sets
learning algorithm
case study
multi agent systems
statistical model
simulation model