Igor V. Kotenko, Mikhail Stepashkin. Network Security Evaluation Based on Simulation of Malfactor s Behavior. In Manu Malek, Eduardo Fernández-Medina, Javier Hernando, editors, SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. pages 339-344, INSTICC Press, 2006.
@inproceedings{KotenkoS06:0, title = {Network Security Evaluation Based on Simulation of Malfactor s Behavior}, author = {Igor V. Kotenko and Mikhail Stepashkin}, year = {2006}, tags = {rule-based, security}, researchr = {https://researchr.org/publication/KotenkoS06%3A0}, cites = {0}, citedby = {0}, pages = {339-344}, booktitle = {SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, editor = {Manu Malek and Eduardo Fernández-Medina and Javier Hernando}, publisher = {INSTICC Press}, isbn = {972-8865-63-5}, }