Login / Signup
A soft constraint-based approach to the cascade vulnerability problem.
Stefano Bistarelli
Simon N. Foley
Barry O'Sullivan
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
soft constraints
constraint satisfaction
hard constraints
max csp
constraint propagation
constraint satisfaction problems
arc consistency
constraint problems
stable marriage
genetic algorithm