Evaluating Network Security With Two-Layer Attack Graphs.


https://doi.org/10.1109/ACSAC.2009.22
@inproceedings{DBLP:conf/acsac/XieCTHC09, author = {Anmin Xie and Zhuhua Cai and Cong Tang and Jian{-}bin Hu and Zhong Chen}, title = {Evaluating Network Security With Two-Layer Attack Graphs}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.22}, doi = {10.1109/ACSAC.2009.22}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/XieCTHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

本页面没有标签
本页面最近更新:2020/05/21更新历史
发现错误?想一起完善? 在 GitHub 上编辑此页!
本页面的全部内容在 CC BY-SA 4.0 SATA 协议之条款下提供,附加条款亦可能应用

Copyright © 2016 - 2020 PKU Scholar

最近更新: 52aade4, 2020-05-21