Login / Signup

Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities.

Michel CukierSusmit Panjwani
Published in: IEEE Secur. Priv. (2009)
Keyphrases
  • attack graphs
  • attack graph
  • security vulnerabilities
  • buffer overflow
  • network configuration
  • alert correlation
  • intrusion detection
  • attack scenarios
  • search engine