Evaluating Network Security With Two-Layer Attack Graphs.
https://doi.org/10.1109/ACSAC.2009.22
@inproceedings{DBLP:conf/acsac/XieCTHC09,
author = {Anmin Xie and
Zhuhua Cai and
Cong Tang and
Jian{-}bin Hu and
Zhong Chen},
title = {Evaluating Network Security With Two-Layer Attack Graphs},
booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
2009, Honolulu, Hawaii, USA, 7-11 December 2009},
pages = {127--136},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/ACSAC.2009.22},
doi = {10.1109/ACSAC.2009.22},
timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
biburl = {https://dblp.org/rec/conf/acsac/XieCTHC09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
本页面没有标签