×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [attack graph]
Documents
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01
224 views
Documents
P REDICTING ZERO - DAY SOFTWARE VULNERABILITIES THROUGH DATA MINING Su Zhang Department of Computing and Information Science Kansas State University 1
213 views
Documents
Optimal Allocation of Filters against DDoS Attacks Advisor: Frank, Y.S. Lin Present by C.Y. Hsu 1
222 views
Documents
Research in Security and Dependable Computing Shambhu Upadhyaya Computer Science and Engineering University at Buffalo
[email protected]
August 28,
222 views
Documents
Optimal Allocation of Filters against DDoS Attacks
45 views
Documents
Predicting zero-day software vulnerabilities through data mining
31 views