Modeling and detecting the cascade vulnerability problem using soft constraints. Bistarelli, S., Foley, S. N., & O'Sullivan, B. In Proceedings of Selected Areas in Cryptography (SAC), pages 383-390, 2004.
Modeling and detecting the cascade vulnerability problem using soft constraints [link]Paper  bibtex   
@inproceedings{ dblp4049665,
  title = {Modeling and detecting the cascade vulnerability problem using soft constraints},
  author = {Stefano Bistarelli and Simon N. Foley and Barry O'Sullivan},
  author_short = {Bistarelli, S. and Foley, S. N. and O'Sullivan, B.},
  bibtype = {inproceedings},
  type = {inproceedings},
  year = {2004},
  key = {dblp4049665},
  id = {dblp4049665},
  biburl = {http://www.dblp.org/rec/bibtex/conf/sac/BistarelliFO04},
  url = {http://doi.acm.org/10.1145/967900.967984},
  conference = {SAC},
  pages = {383-390},
  text = {SAC 2004:383-390},
  booktitle = {Proceedings of Selected Areas in Cryptography (SAC)}
}

Downloads: 0