Yazar
Cuppens-Boulahia, Nora. editor.
Format:
Electronic Resources
Alıntı:
, metrics and risk assessment, information flow control, identity management, identifiability and decision
Yazar
Jajodia, Sushil. editor.
Format:
Electronic Resources
Alıntı:
Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security
View Other Search Results
Yazar
Jajodia, Sushil. editor.
Format:
Electronic Resources
Alıntı:
computation based on their level of sensitivity. The chapter also describes a vulnerability assessment
Arama Sonuçlarını Sınırlandır
Daraltılmış: