Use of Attack Graphs in Security Systems
Journal of Computer Networks and Communications - Egypt
doi 10.1155/2014/818957
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2014
Authors
Publisher
Hindawi Limited
Available in full text
January 1, 2014
Hindawi Limited