Login / Signup
Foundations of Attack Trees.
Sjouke Mauw
Martijn Oostdijk
Published in:
ICISC (2005)
Keyphrases
</>
decision trees
artificial intelligence
tree structure
countermeasures
unordered trees
malicious users
neural network
information systems
real time
data sets
real world
knowledge base
query processing
cyber attacks
detection mechanism