Login / Signup

A Scalable Approach to Full Attack Graphs Generation.

Feng ChenJinshu SuYi Zhang
Published in: ESSoS (2009)
Keyphrases
  • attack graphs
  • attack graph
  • distributed systems
  • security vulnerabilities