Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by O. Sheyner
Two Formal Analyses of Attack Graphs
Related publications
A Formal Proof of the Minor-Exclusion Property for Treewidth-Two Graphs
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Use of Attack Graphs in Security Systems
Journal of Computer Networks and Communications
Computer Networks
Information Systems
Communications
An Annotated Review of Past Papers on Attack Graphs
Publishing Attributed Social Graphs With Formal Privacy Guarantees
Vulnerability Assessment by Learning Attack Specifications in Graphs
Aggregating Vulnerability Metrics in Enterprise Networks Using Attack Graphs
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Exploring, Reasoning With and Validating Directed Graphs by Applying Formal Concept Analysis to Conceptual Graphs
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Time-Efficient and Cost-Effective Network Hardening Using Attack Graphs
Relaxed Two-Coloring of Cubic Graphs
Journal of Combinatorial Theory. Series B
Combinatorics
Computational Theory
Discrete Mathematics
Theoretical Computer Science
Mathematics