A Network Security Analysis Method Using Vulnerability Correlation

Zhi-Yong Li, Chao-Hai Xie, Ran Tao, Hao Zhang, Na Shi. A Network Security Analysis Method Using Vulnerability Correlation. In Haiying Wang, Kay-Soon Low, Kexin Wei, Junqing Sun, editors, Fifth International Conference on Natural Computation, ICNC 2009, Tianjian, China, 14-16 August 2009, 6 Volumes. pages 17-21, IEEE Computer Society, 2009. [doi]

Authors

Zhi-Yong Li

This author has not been identified. Look up 'Zhi-Yong Li' in Google

Chao-Hai Xie

This author has not been identified. Look up 'Chao-Hai Xie' in Google

Ran Tao

This author has not been identified. Look up 'Ran Tao' in Google

Hao Zhang

This author has not been identified. Look up 'Hao Zhang' in Google

Na Shi

This author has not been identified. Look up 'Na Shi' in Google