Login / Signup

Managing cyber security vulnerabilities in large networks.

Edward S. ChangAridaman K. JainDavid M. SladeS. Lee Tsao
Published in: Bell Labs Tech. J. (1999)
Keyphrases
  • security vulnerabilities
  • social networks
  • intrusion detection
  • computer networks
  • dos attacks
  • security properties
  • penetration testing
  • low cost
  • network structure
  • unauthorized access