Efficient generation of exploit dependency graph by customized attack modeling technique

Author(s):  
Ishan Chokshi ◽  
Nirnay Ghosh ◽  
Soumya K Ghosh
2003 ◽  
Author(s):  
Ulf Lindqvist ◽  
Steven Cheung ◽  
Rico Valdez
Keyword(s):  

2019 ◽  
Author(s):  
Linhan Ouyang ◽  
Liangqi Wan ◽  
Chanseok Park ◽  
Jianjun Wang ◽  
Yizhong Ma

Cancer ◽  
2002 ◽  
Vol 95 (7) ◽  
pp. 1451-1456 ◽  
Author(s):  
Louis Potters ◽  
Rosemary Purrazzella ◽  
Sheryl Brustein ◽  
Paul Fearn ◽  
Steven A. Leibel ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document