2
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Managing Cyber Threats 

      Topological Analysis of Network Attack Vulnerability

      other
      , ,
      Springer-Verlag

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references7

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Scalable, graph-based network vulnerability analysis

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Automated generation and analysis of attack graphs

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Using model checking to analyze network vulnerabilities

                Bookmark

                Author and book information

                Book Chapter
                : 247-266
                10.1007/0-387-24230-9_9
                4a8809d1-0121-4d24-900a-1b51ef65ee44
                History

                Comments

                Comment on this book