Archive > Volume 40 Issue 12 > 2017,40(12):35-42. DOI:10.11835/j.issn.1000-582X.2017.12.005 CSTR:[cstr] Prev Next

A computing approach of information system vulnerability's exploited probability