DEVELOPMENT OF GRAPH-BASED SECURITY METRIC

A computer network can consist of client hosts and server hosts. Vulnerabilities can be found on each host. Connectivity matrix represents a connectivity between a host to another host. Vulnerability matix represents every vulnerability in every host. Attack rule represents a rule for attacker to...

Full description

Saved in:
Bibliographic Details
Main Author: Waluyo Purboyo, Tito
Format: Dissertations
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/37382
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia