Extending logical attack graphs for efficient vulnerability analysis

Diptikalyan Saha. Extending logical attack graphs for efficient vulnerability analysis. In Peng Ning, Paul F. Syverson, Somesh Jha, editors, Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008. pages 63-74, ACM, 2008. [doi]

@inproceedings{Saha08,
  title = {Extending logical attack graphs for efficient vulnerability analysis},
  author = {Diptikalyan Saha},
  year = {2008},
  doi = {10.1145/1455770.1455780},
  url = {http://doi.acm.org/10.1145/1455770.1455780},
  tags = {analysis, graph-rewriting, rewriting},
  researchr = {https://researchr.org/publication/Saha08},
  cites = {0},
  citedby = {0},
  pages = {63-74},
  booktitle = {Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  editor = {Peng Ning and Paul F. Syverson and Somesh Jha},
  publisher = {ACM},
  isbn = {978-1-59593-810-7},
}