Login / Signup
Managing cyber security vulnerabilities in large networks.
Edward S. Chang
Aridaman K. Jain
David M. Slade
S. Lee Tsao
Published in:
Bell Labs Tech. J. (1999)
Keyphrases
</>
security vulnerabilities
social networks
intrusion detection
computer networks
dos attacks
security properties
penetration testing
low cost
network structure
unauthorized access