Showing 1 - 1 of 1
Modelling an attack tree is basically a matter of associating a logical "and" and a logical "or" but in most of real world applications related to fraud management the "and/or"logic is not adequate to effectively represent the relationship between a parent node and its children, most of all when...
Persistent link: https://www.econbiz.de/10009321757