Čájehuvvojit 1 - 2 oktiibuot 2 bohtosis ohcui "Graph clustering algorithms"', ohcanáigi: 0,83s Aiddostahte ozu
  1. 1
  2. 2

    Research on the risk adjacency matrix based on attack graphs Dahkki YE Yun, XU Xi-shan, JIA Yan, QI Zhi-chang, CHENG Wen-cong

    Almmustuhtton 2011-01-01
    Fáttát: “…vulnerability;attack graphs;clustering algorithm;risk adjacency matrix…”
    Viečča ollesdeavstta
    Artihkal