A Protocol Vulnerability Analysis Method Based on Logical Attack Graph

Chunrui Zhang, Shen Wang, Dechen Zhan. A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. In Jeng-Shyang Pan 0001, Pei-wei Tsai, Junzo Watada, Lakhmi C. Jain, editors, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II. Volume 82 of Smart Innovation, Systems and Technologies, pages 309-317, Springer, 2017. [doi]

Abstract

Abstract is missing.