1 minute read
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USING VARIOUS OPTIMIZATION TECHNIQUES AS WELL AS NETWORK MANAGEMENT MODELS GIVINGSPECIAL EMPHASIS TO ATTACK TREE MODEL
from OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USING VARIOUS OPTIMIZATION
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USING VARIOUS OPTIMIZATION TECHNIQUES AS WELL AS NETWORK MANAGEMENT MODELS GIVING SPECIAL EMPHASIS TO ATTACK TREE MODEL
Advertisement