Techniques for attack graph visualization and interaction

Zach Harbort, George Louthan, John Hale. Techniques for attack graph visualization and interaction. In Frederick T. Sheldon, Robert K. Abercrombie, Axel W. Krings, editors, Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011. pages 74, ACM, 2011. [doi]

@inproceedings{HarbortLH11,
  title = {Techniques for attack graph visualization and interaction},
  author = {Zach Harbort and George Louthan and John Hale},
  year = {2011},
  doi = {10.1145/2179298.2179383},
  url = {http://doi.acm.org/10.1145/2179298.2179383},
  researchr = {https://researchr.org/publication/HarbortLH11},
  cites = {0},
  citedby = {0},
  pages = {74},
  booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011},
  editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings},
  publisher = {ACM},
  isbn = {978-1-4503-0945-5},
}