Login / Signup
A Scalable Approach to Full Attack Graphs Generation.
Feng Chen
Jinshu Su
Yi Zhang
Published in:
ESSoS (2009)
Keyphrases
</>
attack graphs
attack graph
distributed systems
security vulnerabilities