A threat assessment method based on hierarchies and modules

Fang Deng, Xinan Liu, Zhihong Peng, Jie Chen

Research output: Contribution to journalArticlepeer-review

Fingerprint

Dive into the research topics of 'A threat assessment method based on hierarchies and modules'. Together they form a unique fingerprint.

Engineering

Computer Science