"Flow-Graph and Markovian Methods for Cyber Security Analysis."

Kouroush Jenab, Sam Khoury, Kim LaFevor (2016)

Details and statistics

DOI: 10.4018/IJEIS.2016010104

access: closed

type: Journal Article

metadata version: 2020-06-25

a service of  Schloss Dagstuhl - Leibniz Center for Informatics