Vulnerability Evaluating Based on Attack Graph

Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang. Vulnerability Evaluating Based on Attack Graph. In Yuyu Yuan, Xu Wu, Yueming Lu, editors, Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers. Volume 320 of Communications in Computer and Information Science, pages 555-563, Springer, 2012. [doi]

@inproceedings{WangBLZ12,
  title = {Vulnerability Evaluating Based on Attack Graph},
  author = {Chunlu Wang and Yu Bao and Xuesen Liang and Tianle Zhang},
  year = {2012},
  doi = {10.1007/978-3-642-35795-4_70},
  url = {https://doi.org/10.1007/978-3-642-35795-4_70},
  researchr = {https://researchr.org/publication/WangBLZ12},
  cites = {0},
  citedby = {0},
  pages = {555-563},
  booktitle = {Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  editor = {Yuyu Yuan and Xu Wu and Yueming Lu},
  volume = {320},
  series = {Communications in Computer and Information Science},
  publisher = {Springer},
  isbn = {978-3-642-35794-7},
}