Login / Signup

Measuring vulnerabilities and their exploitation cycle.

Evangelos MorakisStilianos VidalisAndrew Blyth
Published in: Inf. Secur. Tech. Rep. (2003)
Keyphrases
  • information security
  • databases
  • security vulnerabilities
  • artificial intelligence
  • countermeasures
  • data sets
  • website
  • decision trees
  • database systems
  • learning environment
  • operating system