DEVELOPMENT OF GRAPH-BASED SECURITY METRIC
A computer network can consist of client hosts and server hosts. Vulnerabilities can be found on each host. Connectivity matrix represents a connectivity between a host to another host. Vulnerability matix represents every vulnerability in every host. Attack rule represents a rule for attacker to...
Saved in:
Main Author: | Waluyo Purboyo, Tito |
---|---|
Format: | Dissertations |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/37382 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Similar Items
-
DEVELOPING COMPUTER PROGRAM FOR COMPUTING EIGENPAIRS OF 2X2 MATRICES AND 3x3 UPPER TRIANGULAR MATRICES USING THE SIMPLE ALGORITHM
by: WALUYO PURBOYO (NIM: 20107096), TITO -
GRAPHS WITH MINIMUM METRIC DIMENSION
by: Salim, Anderson -
Metric mapping and topo-metric graph learning of urban road network
by: Qin, B., et al.
Published: (2014) -
ON THE METRIC DIMENSION OF REGULAR AND COMPOSITION GRAPHS AND CHARACTERIZATION OF ALL GRAPHS OF ORDER N WITH METRIC DIMENSION N-3
by: WIDO SAPUTRO (NIM: 30107007); Tim Pembimbing: Prof. Dr. Edy Tri Baskoro, Prof. Dr. M. Salman , SUHADI -
THE METRIC DIMENSION OF COMB PRODUCT GRAPHS
by: MARDIANA (NIM : 20111037); Pembimbing Tesis : Dr. Suhadi Wido Saputro, NOVI