Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)

Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian. Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). In Sihan Qing, Wenbo Mao, Javier Lopez, Guilin Wang, editors, Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings. Volume 3783 of Lecture Notes in Computer Science, pages 256-268, Springer, 2005. [doi]

@inproceedings{ShahriariSJZO05,
  title = {Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)},
  author = {Hamid Reza Shahriari and Reza Sadoddin and Rasool Jalili and Reza Zakeri and Ali Reza Omidian},
  year = {2005},
  doi = {10.1007/11602897_22},
  url = {http://dx.doi.org/10.1007/11602897_22},
  tags = {analysis},
  researchr = {https://researchr.org/publication/ShahriariSJZO05},
  cites = {0},
  citedby = {0},
  pages = {256-268},
  booktitle = {Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings},
  editor = {Sihan Qing and Wenbo Mao and Javier Lopez and Guilin Wang},
  volume = {3783},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-30934-9},
}