Efficient generation of exploit dependency graph by customized attack modeling technique
2010 ◽
Vol 1
(3)
◽
pp. 231-241
◽
Keyword(s):
Keyword(s):