Login / Signup
Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities.
Michel Cukier
Susmit Panjwani
Published in:
IEEE Secur. Priv. (2009)
Keyphrases
</>
attack graphs
attack graph
security vulnerabilities
buffer overflow
network configuration
alert correlation
intrusion detection
attack scenarios
search engine