A Protocol Vulnerability Analysis Method Based on Logical Attack Graph

Chunrui Zhang, Shen Wang, Dechen Zhan. A Protocol Vulnerability Analysis Method Based on Logical Attack Graph. In Jeng-Shyang Pan 0001, Pei-wei Tsai, Junzo Watada, Lakhmi C. Jain, editors, Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II. Volume 82 of Smart Innovation, Systems and Technologies, pages 309-317, Springer, 2017. [doi]

@inproceedings{ZhangWZ17-18,
  title = {A Protocol Vulnerability Analysis Method Based on Logical Attack Graph},
  author = {Chunrui Zhang and Shen Wang and Dechen Zhan},
  year = {2017},
  doi = {10.1007/978-3-319-63859-1_38},
  url = {https://doi.org/10.1007/978-3-319-63859-1_38},
  researchr = {https://researchr.org/publication/ZhangWZ17-18},
  cites = {0},
  citedby = {0},
  pages = {309-317},
  booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part II},
  editor = {Jeng-Shyang Pan 0001 and Pei-wei Tsai and Junzo Watada and Lakhmi C. Jain},
  volume = {82},
  series = {Smart Innovation, Systems and Technologies},
  publisher = {Springer},
  isbn = {978-3-319-63859-1},
}