Zhi-Yong Li, Chao-Hai Xie, Ran Tao, Hao Zhang, Na Shi. A Network Security Analysis Method Using Vulnerability Correlation. In Haiying Wang, Kay-Soon Low, Kexin Wei, Junqing Sun, editors, Fifth International Conference on Natural Computation, ICNC 2009, Tianjian, China, 14-16 August 2009, 6 Volumes. pages 17-21, IEEE Computer Society, 2009. [doi]
@inproceedings{LiXTZS09, title = {A Network Security Analysis Method Using Vulnerability Correlation}, author = {Zhi-Yong Li and Chao-Hai Xie and Ran Tao and Hao Zhang and Na Shi}, year = {2009}, doi = {10.1109/ICNC.2009.368}, url = {http://doi.ieeecomputersociety.org/10.1109/ICNC.2009.368}, tags = {analysis, security}, researchr = {https://researchr.org/publication/LiXTZS09}, cites = {0}, citedby = {0}, pages = {17-21}, booktitle = {Fifth International Conference on Natural Computation, ICNC 2009, Tianjian, China, 14-16 August 2009, 6 Volumes}, editor = {Haiying Wang and Kay-Soon Low and Kexin Wei and Junqing Sun}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3736-8}, }