Computer Science ›› 2006, Vol. 33 ›› Issue (10): 93-96.
Previous Articles Next Articles
Online:
Published:
Abstract: To deal with the increasingly serious problem of attack, after researched on many attack and existing attack analyzing methods, a systematical method to analyzing and describing attack is put forward in this paper. This method can not only effectively ana
Key words: Security, Attack, Attack process, Tailoring, Tailoring rule
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I10/93
Cited