|
Volumn , Issue , 2007, Pages 2-
|
Topological analysis of network attack vulnerability
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CORRELATION METHODS;
GRAPHIC METHODS;
INTRUSION DETECTION;
NETWORK SECURITY;
SET THEORY;
TOPOLOGY;
ATTACK SEQUENCES;
NETWORK ATTACK VULNERABILITY;
COMPUTER NETWORKS;
|
EID: 34748883109
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1229285.1229288 Document Type: Conference Paper |
Times cited : (22)
|
References (0)
|