Computer Science ›› 2006, Vol. 33 ›› Issue (8): 271-274.
Previous Articles Next Articles
Online:
Published:
Abstract: The computer security risk analysis model bases on term rewriting comes out with the result immediately form algebra signature, ignoring the reduction procedure of related attack, providing no unified view of decisions and attacks, making it easy to propa
Key words: Risk analysis, Graph rewriting, Termination, Vertex cover
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I8/271
Cited