Amanote Research

Amanote Research

    RegisterSign In

Two Formal Analyses of Attack Graphs

doi 10.1109/csfw.2002.1021806
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
S. JhaO. SheynerJ. Wing
Publisher

IEEE Comput. Soc


Related search

A Formal Proof of the Minor-Exclusion Property for Treewidth-Two Graphs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Use of Attack Graphs in Security Systems

Journal of Computer Networks and Communications
Computer NetworksInformation SystemsCommunications
2014English

An Annotated Review of Past Papers on Attack Graphs

2005English

Publishing Attributed Social Graphs With Formal Privacy Guarantees

2016English

Vulnerability Assessment by Learning Attack Specifications in Graphs

2007English

Aggregating Vulnerability Metrics in Enterprise Networks Using Attack Graphs

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2013English

Exploring, Reasoning With and Validating Directed Graphs by Applying Formal Concept Analysis to Conceptual Graphs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Time-Efficient and Cost-Effective Network Hardening Using Attack Graphs

2012English

Relaxed Two-Coloring of Cubic Graphs

Journal of Combinatorial Theory. Series B
CombinatoricsComputational TheoryDiscrete MathematicsTheoretical Computer ScienceMathematics
2007English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy