A Network Security Analysis Method Using Vulnerability Correlation

Zhi-Yong Li, Chao-Hai Xie, Ran Tao, Hao Zhang, Na Shi. A Network Security Analysis Method Using Vulnerability Correlation. In Haiying Wang, Kay-Soon Low, Kexin Wei, Junqing Sun, editors, Fifth International Conference on Natural Computation, ICNC 2009, Tianjian, China, 14-16 August 2009, 6 Volumes. pages 17-21, IEEE Computer Society, 2009. [doi]

Abstract

Abstract is missing.