Login / Signup
A Network Security Analysis Method Using Vulnerability Correlation.
Zhi-Yong Li
Chao-Hai Xie
Ran Tao
Hao Zhang
Na Shi
Published in:
ICNC (1) (2009)
Keyphrases
</>
security analysis
database systems
encryption algorithm