Author:
Kotenko Igor,Novikova Evgenia
Publisher
Springer Berlin Heidelberg
Reference33 articles.
1. Lecture Notes in Computer Science;M. Anwar,2010
2. Anwar, M., Fong, P.W.L.: P.: A Visualisation Tool for Evaluating Access Control Policies in Facebook-style Social Network Systems. Proc. of the 27th Annual ACM Symposium on Applied Computing (SAC 2012), pp. 1443–1450. ACM, New York (2012)
3. Chu, M., Ingols, K., Lippmann, R., Webster, S., Boyer, S.: Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR. In: Proc. of the Seventh International Symposium on Visualization for Cyber Security, Ontario, Canada, pp. 22–33 (2010)
4. Common Vulnerabilities and Exposures,
http://cve.mitre.org/
5. Common Vulnerability Scoring System,
http://www.first.org/cvss/
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献