Sign in

Analysis of Attack Graph Representations for Ranking Vulnerability Fixes.

Tom GondaTal PascalRami PuzisGuy ShaniBracha Shapira
Published in: GCAI (2018)
Keyphrases
  • graph representations
  • social networks
  • random walk