A Network Security Analysis Method Using Vulnerability Correlation

Zhi-Yong Li, Chao-Hai Xie, Ran Tao, Hao Zhang, Na Shi. A Network Security Analysis Method Using Vulnerability Correlation. In Haiying Wang, Kay-Soon Low, Kexin Wei, Junqing Sun, editors, Fifth International Conference on Natural Computation, ICNC 2009, Tianjian, China, 14-16 August 2009, 6 Volumes. pages 17-21, IEEE Computer Society, 2009. [doi]

@inproceedings{LiXTZS09,
  title = {A Network Security Analysis Method Using Vulnerability Correlation},
  author = {Zhi-Yong Li and Chao-Hai Xie and Ran Tao and Hao Zhang and Na Shi},
  year = {2009},
  doi = {10.1109/ICNC.2009.368},
  url = {http://doi.ieeecomputersociety.org/10.1109/ICNC.2009.368},
  tags = {analysis, security},
  researchr = {https://researchr.org/publication/LiXTZS09},
  cites = {0},
  citedby = {0},
  pages = {17-21},
  booktitle = {Fifth International Conference on Natural Computation, ICNC 2009, Tianjian, China, 14-16 August 2009, 6 Volumes},
  editor = {Haiying Wang and Kay-Soon Low and Kexin Wei and Junqing Sun},
  publisher = {IEEE Computer Society},
  isbn = {978-0-7695-3736-8},
}