Use of Attack Graphs in Security Systems

Journal of Computer Networks and Communications - Egypt
doi 10.1155/2014/818957
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Hindawi Limited


Related search