Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs | IEEE Conference Publication | IEEE Xplore
  Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]