Computer Science ›› 2006, Vol. 33 ›› Issue (10): 93-96.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: To deal with the increasingly serious problem of attack, after researched on many attack and existing attack analyzing methods, a systematical method to analyzing and describing attack is put forward in this paper. This method can not only effectively ana

Key words: Security, Attack, Attack process, Tailoring, Tailoring rule

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!