Flaw Selection Strategies next up previous
Next: Threat Preference and Delay Up: Flaw Selection Strategies For Previous: Notation  

Flaw Selection Strategies

 

We begin by reviewing the flaw selection strategies that have been proposed and studied in the literature to date.





TOM Conversion
Wed Jun 25 17:40:58 EDT 1997