Modeling and detecting the cascade vulnerability problem using soft constraints. Bistarelli, S., Foley, S. N., & O'Sullivan, B. In Proceedings of Selected Areas in Cryptography (SAC), pages 383-390, 2004.
Paper bibtex @inproceedings{ dblp4049665,
title = {Modeling and detecting the cascade vulnerability problem using soft constraints},
author = {Stefano Bistarelli and Simon N. Foley and Barry O'Sullivan},
author_short = {Bistarelli, S. and Foley, S. N. and O'Sullivan, B.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2004},
key = {dblp4049665},
id = {dblp4049665},
biburl = {http://www.dblp.org/rec/bibtex/conf/sac/BistarelliFO04},
url = {http://doi.acm.org/10.1145/967900.967984},
conference = {SAC},
pages = {383-390},
text = {SAC 2004:383-390},
booktitle = {Proceedings of Selected Areas in Cryptography (SAC)}
}
Downloads: 0
{"_id":{"_str":"53f5b55bf7f6696c7c0000f4"},"__v":0,"authorIDs":["5457089d8b01c8193000012f"],"author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-oapossullivan-modelinganddetectingthecascadevulnerabilityproblemusingsoftconstraints-2004","bibdata":{"title":"Modeling and detecting the cascade vulnerability problem using soft constraints","author":["Stefano Bistarelli","Simon N. Foley","Barry O'Sullivan"],"author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"bibtype":"inproceedings","type":"inproceedings","year":"2004","key":"dblp4049665","id":"dblp4049665","biburl":"http://www.dblp.org/rec/bibtex/conf/sac/BistarelliFO04","url":"http://doi.acm.org/10.1145/967900.967984","conference":"SAC","pages":"383-390","text":"SAC 2004:383-390","booktitle":"Proceedings of Selected Areas in Cryptography (SAC)","bibtex":"@inproceedings{ dblp4049665,\n title = {Modeling and detecting the cascade vulnerability problem using soft constraints},\n author = {Stefano Bistarelli and Simon N. Foley and Barry O'Sullivan},\n author_short = {Bistarelli, S. and Foley, S. N. and O'Sullivan, B.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2004},\n key = {dblp4049665},\n id = {dblp4049665},\n biburl = {http://www.dblp.org/rec/bibtex/conf/sac/BistarelliFO04},\n url = {http://doi.acm.org/10.1145/967900.967984},\n conference = {SAC},\n pages = {383-390},\n text = {SAC 2004:383-390},\n booktitle = {Proceedings of Selected Areas in Cryptography (SAC)}\n}","bibbaseid":"bistarelli-foley-oapossullivan-modelinganddetectingthecascadevulnerabilityproblemusingsoftconstraints-2004","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/967900.967984"},"downloads":0},"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/sac/BistarelliFO04","creationDate":"2014-08-21T09:01:15.268Z","downloads":0,"keywords":[],"search_terms":["modeling","detecting","cascade","vulnerability","problem","using","soft","constraints","bistarelli","foley","o'sullivan"],"title":"Modeling and detecting the cascade vulnerability problem using soft constraints","year":2004,"dataSources":["w47iiFZHLc5h5TEJM"]}