Attack Graph Based Evaluation of Network Security
Lecture notes in computer science2006pp. 216–227
Citations Over TimeTop 10% of 2006 papers
Related Papers
- → Strategies for security measurement objective decomposition(2012)9 cited
- → A Security Property Decomposition Argument Pattern for Structured Assurance Case Models(2021)5 cited
- Extrapolating security requirements to an established software process: Version 1.0(2011)
- → Scheduling of Security Resources in Software Defined Security Architecture(2017)1 cited
- → Security Patterns(2011)