Showing 1 - 15 results of 15 for search '"transitional model"', query time: 0.10s Refine Results
  1. 1
  2. 2
  3. 3

    Evaluating the network security by the Read<sub>W</sub>rite transition model by LU Zhi-yong1, 2, FENG Chao1, YU Hui2

    Published 2010-01-01
    Subjects: “…ReadWrite transition model…”
    Get full text
    Article
  4. 4
  5. 5

    Attack scenarios reasoning,hypothesizing and predicting based on capability transition model by TIAN Zhi-hong1, ZHANG Wei-zhe1, ZHANG Yong-zheng2, ZHANG Hong-li 1, LI Yang2, JIANG Wei1

    Published 2007-01-01
    Subjects: “…Internet security;attack scenario;capability transition model;intrusion detection…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15