Computer Science ›› 2006, Vol. 33 ›› Issue (8): 271-274.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: The computer security risk analysis model bases on term rewriting comes out with the result immediately form algebra signature, ignoring the reduction procedure of related attack, providing no unified view of decisions and attacks, making it easy to propa

Key words: Risk analysis, Graph rewriting, Termination, Vertex cover

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!