A soft constraint-based approach to the cascade vulnerability problem. Bistarelli, S., Foley, S. N., & O'Sullivan, B. J. Comput. Secur., 13(5):699–720, 2005. Paper doi bibtex @article{DBLP:journals/jcs/BistarelliFO05,
author = {Stefano Bistarelli and
Simon N. Foley and
Barry O'Sullivan},
title = {A soft constraint-based approach to the cascade vulnerability problem},
journal = {J. Comput. Secur.},
volume = {13},
number = {5},
pages = {699--720},
year = {2005},
url = {https://doi.org/10.3233/jcs-2005-13502},
doi = {10.3233/JCS-2005-13502},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcs/BistarelliFO05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a0012c9"},"__v":3,"authorIDs":["5457089d8b01c8193000012f","5a8SaRQZEqQauLeSj","5dec2eeed39dc7de01000059","5defa628706001de01000155","5df0bf368367c8de0100014e","5df7a6a2f3cb28df0100013e","5df8c7c4e6b510df0100018c","5df8e4de877972de0100016c","5df99361c4ada8de01000018","5dfea9342331dfdf01000059","5e012b722e225bde01000053","5e0968c8ade67ddf01000043","5e0b068b3830a1df010000e1","5e10a884cfb06ddf0100002c","5e10fd55d6a01ede01000024","5e142e4b12768ef30100003c","5e1961659eca7cdf01000080","5e1a2ca69fbdddde010000ff","5e1f814208195af3010000a8","5e2b62d96366e2df010000e6","5e2b8ef4f92538df01000011","5e2d73a3556d50df01000041","5e30e7755f9c1cf2010000d7","5e35f2395cd57fde010000c7","5e3a22e3c268d2de01000108","5e3b007c55f0f2df0100011a","5e3e128b4cdb49de0100008a","5e4094bbd668c6de0100007c","5e40f782fd6934df01000169","5e413b68b7d170df01000092","5e42e16aa6f4a6f2010000d1","5e4eddeb2962cadf010000e9","5e54f08fb8e445df01000107","6rZ7TmdCqfG4dxRdT","Q5h43gs9oNpAm4KeK","Zw3hLXQ8Xyab4HobY"],"author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-osullivan-asoftconstraintbasedapproachtothecascadevulnerabilityproblem-2005","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Simon","N."],"propositions":[],"lastnames":["Foley"],"suffixes":[]},{"firstnames":["Barry"],"propositions":[],"lastnames":["O'Sullivan"],"suffixes":[]}],"title":"A soft constraint-based approach to the cascade vulnerability problem","journal":"J. Comput. Secur.","volume":"13","number":"5","pages":"699–720","year":"2005","url":"https://doi.org/10.3233/jcs-2005-13502","doi":"10.3233/JCS-2005-13502","timestamp":"Mon, 28 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/jcs/BistarelliFO05.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/jcs/BistarelliFO05,\n author = {Stefano Bistarelli and\n Simon N. Foley and\n Barry O'Sullivan},\n title = {A soft constraint-based approach to the cascade vulnerability problem},\n journal = {J. Comput. Secur.},\n volume = {13},\n number = {5},\n pages = {699--720},\n year = {2005},\n url = {https://doi.org/10.3233/jcs-2005-13502},\n doi = {10.3233/JCS-2005-13502},\n timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/jcs/BistarelliFO05.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"key":"DBLP:journals/jcs/BistarelliFO05","id":"DBLP:journals/jcs/BistarelliFO05","bibbaseid":"bistarelli-foley-osullivan-asoftconstraintbasedapproachtothecascadevulnerabilityproblem-2005","role":"author","urls":{"Paper":"https://doi.org/10.3233/jcs-2005-13502"},"metadata":{"authorlinks":{"bistarelli, s":"https://bista.sites.dmi.unipg.it/papers/"}},"downloads":0},"bibtype":"article","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.829Z","downloads":0,"keywords":[],"search_terms":["soft","constraint","based","approach","cascade","vulnerability","problem","bistarelli","foley","o'sullivan"],"title":"A soft constraint-based approach to the cascade vulnerability problem","year":2005,"dataSources":["GhB5rb8JzW6az3exo","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"]}