A Protocol Vulnerability Analysis Method Based on Logical Attack Graph

Chunrui Zhang, Shen Wang, Dechen Zhan. A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. In Jeng-Shyang Pan 0001, Pei-wei Tsai, Junzo Watada, Lakhmi C. Jain, editors, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II. Volume 82 of Smart Innovation, Systems and Technologies, pages 309-317, Springer, 2017. [doi]

Authors

Chunrui Zhang

This author has not been identified. Look up 'Chunrui Zhang' in Google

Shen Wang

This author has not been identified. Look up 'Shen Wang' in Google

Dechen Zhan

This author has not been identified. Look up 'Dechen Zhan' in Google