Login / Signup
Vulnerability analysis for a quantitative security evaluation.
Geraldine Vache
Published in:
ESEM (2009)
Keyphrases
</>
neural network
intrusion detection
genetic algorithm
qualitative and quantitative
quantitative and qualitative
evaluation model
security systems
information assurance
access control
network security
evaluation metrics
evaluation criteria
security policies
security requirements
security protocols
malware detection