Sign in

A Network Security Analysis Method Using Vulnerability Correlation.

Zhi-Yong LiChao-Hai XieRan TaoHao ZhangNa Shi
Published in: ICNC (1) (2009)
Keyphrases
  • security analysis
  • database systems
  • encryption algorithm