Publisher
Springer Berlin Heidelberg
Reference3 articles.
1. Bringhenti D, Marchetto G, Sisto R, & Valenza F (2023) Automation for network security configuration: state of the art and research trends. ACM Comput Surv 56(3), ACM
2. Iganibo I, Albanese M, Mosko M, Bier E, Brito AE (2023) An attack volume metric. Secur Priv 6(4), Wiley
3. Soroush H, Albanese M, Asgari Mehrabadi M, Iganibo I, Mosko M, Gao JH, Fritz DJ, Rane S, Bier E (2020) SCIBORG: secure configurations for the IoT based on optimization and reasoning on graphs. In: Proceedings of the 8th IEEE Conference on Communications and Network Security (IEEE CNS 2020). ACM