Return to Article Details MODELING THE PROTECTION OF OPERATING SYSTEMS FROM CYBERATTACKS USING THE PEARSON CRITERION Download Download PDF