Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang. Vulnerability Evaluating Based on Attack Graph. In Yuyu Yuan, Xu Wu, Yueming Lu, editors, Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers. Volume 320 of Communications in Computer and Information Science, pages 555-563, Springer, 2012. [doi]
@inproceedings{WangBLZ12, title = {Vulnerability Evaluating Based on Attack Graph}, author = {Chunlu Wang and Yu Bao and Xuesen Liang and Tianle Zhang}, year = {2012}, doi = {10.1007/978-3-642-35795-4_70}, url = {https://doi.org/10.1007/978-3-642-35795-4_70}, researchr = {https://researchr.org/publication/WangBLZ12}, cites = {0}, citedby = {0}, pages = {555-563}, booktitle = {Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, volume = {320}, series = {Communications in Computer and Information Science}, publisher = {Springer}, isbn = {978-3-642-35794-7}, }