Vulnerability Evaluating Based on Attack Graph

Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang. Vulnerability Evaluating Based on Attack Graph. In Yuyu Yuan, Xu Wu, Yueming Lu, editors, Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers. Volume 320 of Communications in Computer and Information Science, pages 555-563, Springer, 2012. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.