Login / Signup
Measuring vulnerabilities and their exploitation cycle.
Evangelos Morakis
Stilianos Vidalis
Andrew Blyth
Published in:
Inf. Secur. Tech. Rep. (2003)
Keyphrases
</>
information security
databases
security vulnerabilities
artificial intelligence
countermeasures
data sets
website
decision trees
database systems
learning environment
operating system