Chunrui Zhang, Shen Wang, Dechen Zhan. A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. In Jeng-Shyang Pan 0001, Pei-wei Tsai, Junzo Watada, Lakhmi C. Jain, editors, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II. Volume 82 of Smart Innovation, Systems and Technologies, pages 309-317, Springer, 2017. [doi]
@inproceedings{ZhangWZ17-18, title = {A Protocol Vulnerability Analysis Method Based on Logical Attack Graph}, author = {Chunrui Zhang and Shen Wang and Dechen Zhan}, year = {2017}, doi = {10.1007/978-3-319-63859-1_38}, url = {https://doi.org/10.1007/978-3-319-63859-1_38}, researchr = {https://researchr.org/publication/ZhangWZ17-18}, cites = {0}, citedby = {0}, pages = {309-317}, booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II}, editor = {Jeng-Shyang Pan 0001 and Pei-wei Tsai and Junzo Watada and Lakhmi C. Jain}, volume = {82}, series = {Smart Innovation, Systems and Technologies}, publisher = {Springer}, isbn = {978-3-319-63859-1}, }