Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints. Bistarelli, S., Foley, S. N., & O'Sullivan, B. In McGuinness, D. L. & Ferguson, G., editors, Proceedings of the Nineteenth National Conference on Artificial Intelligence, Sixteenth Conference on Innovative Applications of Artificial Intelligence, July 25-29, 2004, San Jose, California, USA, pages 808–813, 2004. AAAI Press / The MIT Press. bibtex @inproceedings{DBLP:conf/aaai/BistarelliFO04,
author = {Stefano Bistarelli and
Simon N. Foley and
Barry O'Sullivan},
editor = {Deborah L. McGuinness and
George Ferguson},
title = {Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel
Security Networks Using Soft Constraints},
booktitle = {Proceedings of the Nineteenth National Conference on Artificial Intelligence,
Sixteenth Conference on Innovative Applications of Artificial Intelligence,
July 25-29, 2004, San Jose, California, {USA}},
pages = {808--813},
publisher = {{AAAI} Press / The {MIT} Press},
year = {2004},
timestamp = {Wed, 21 Jul 2004 09:49:06 +0200},
biburl = {https://dblp.org/rec/conf/aaai/BistarelliFO04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a0012d5"},"__v":3,"authorIDs":["5457089d8b01c8193000012f","5a8SaRQZEqQauLeSj","5dec2eeed39dc7de01000059","5defa628706001de01000155","5df0bf368367c8de0100014e","5df7a6a2f3cb28df0100013e","5df8c7c4e6b510df0100018c","5df8e4de877972de0100016c","5df99361c4ada8de01000018","5dfea9342331dfdf01000059","5e012b722e225bde01000053","5e0968c8ade67ddf01000043","5e0b068b3830a1df010000e1","5e10a884cfb06ddf0100002c","5e10fd55d6a01ede01000024","5e142e4b12768ef30100003c","5e1961659eca7cdf01000080","5e1a2ca69fbdddde010000ff","5e1f814208195af3010000a8","5e2b62d96366e2df010000e6","5e2b8ef4f92538df01000011","5e2d73a3556d50df01000041","5e30e7755f9c1cf2010000d7","5e35f2395cd57fde010000c7","5e3a22e3c268d2de01000108","5e3b007c55f0f2df0100011a","5e3e128b4cdb49de0100008a","5e4094bbd668c6de0100007c","5e40f782fd6934df01000169","5e413b68b7d170df01000092","5e42e16aa6f4a6f2010000d1","5e4eddeb2962cadf010000e9","5e54f08fb8e445df01000107","6rZ7TmdCqfG4dxRdT","Q5h43gs9oNpAm4KeK","Zw3hLXQ8Xyab4HobY"],"author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-osullivan-detectingandeliminatingthecascadevulnerabilityproblemfrommultilevelsecuritynetworksusingsoftconstraints-2004","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Simon","N."],"propositions":[],"lastnames":["Foley"],"suffixes":[]},{"firstnames":["Barry"],"propositions":[],"lastnames":["O'Sullivan"],"suffixes":[]}],"editor":[{"firstnames":["Deborah","L."],"propositions":[],"lastnames":["McGuinness"],"suffixes":[]},{"firstnames":["George"],"propositions":[],"lastnames":["Ferguson"],"suffixes":[]}],"title":"Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints","booktitle":"Proceedings of the Nineteenth National Conference on Artificial Intelligence, Sixteenth Conference on Innovative Applications of Artificial Intelligence, July 25-29, 2004, San Jose, California, USA","pages":"808–813","publisher":"AAAI Press / The MIT Press","year":"2004","timestamp":"Wed, 21 Jul 2004 09:49:06 +0200","biburl":"https://dblp.org/rec/conf/aaai/BistarelliFO04.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/aaai/BistarelliFO04,\n author = {Stefano Bistarelli and\n Simon N. Foley and\n Barry O'Sullivan},\n editor = {Deborah L. McGuinness and\n George Ferguson},\n title = {Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel\n Security Networks Using Soft Constraints},\n booktitle = {Proceedings of the Nineteenth National Conference on Artificial Intelligence,\n Sixteenth Conference on Innovative Applications of Artificial Intelligence,\n July 25-29, 2004, San Jose, California, {USA}},\n pages = {808--813},\n publisher = {{AAAI} Press / The {MIT} Press},\n year = {2004},\n timestamp = {Wed, 21 Jul 2004 09:49:06 +0200},\n biburl = {https://dblp.org/rec/conf/aaai/BistarelliFO04.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"editor_short":["McGuinness, D. L.","Ferguson, G."],"key":"DBLP:conf/aaai/BistarelliFO04","id":"DBLP:conf/aaai/BistarelliFO04","bibbaseid":"bistarelli-foley-osullivan-detectingandeliminatingthecascadevulnerabilityproblemfrommultilevelsecuritynetworksusingsoftconstraints-2004","role":"author","urls":{},"metadata":{"authorlinks":{"bistarelli, s":"https://bista.sites.dmi.unipg.it/papers/"}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.842Z","downloads":0,"keywords":[],"search_terms":["detecting","eliminating","cascade","vulnerability","problem","multilevel","security","networks","using","soft","constraints","bistarelli","foley","o'sullivan"],"title":"Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints","year":2004,"dataSources":["GhB5rb8JzW6az3exo","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"]}