Modeling and detecting the cascade vulnerability problem using soft constraints. Bistarelli, S., Foley, S. N., & O'Sullivan, B. In Haddad, H., Omicini, A., Wainwright, R. L., & Liebrock, L. M., editors, Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pages 383–390, 2004. ACM. Paper doi bibtex @inproceedings{DBLP:conf/sac/BistarelliFO04,
author = {Stefano Bistarelli and
Simon N. Foley and
Barry O'Sullivan},
editor = {Hisham Haddad and
Andrea Omicini and
Roger L. Wainwright and
Lorie M. Liebrock},
title = {Modeling and detecting the cascade vulnerability problem using soft
constraints},
booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
Nicosia, Cyprus, March 14-17, 2004},
pages = {383--390},
publisher = {{ACM}},
year = {2004},
url = {https://doi.org/10.1145/967900.967984},
doi = {10.1145/967900.967984},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sac/BistarelliFO04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a0012cc"},"__v":0,"authorIDs":["5457089d8b01c8193000012f"],"author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-osullivan-modelinganddetectingthecascadevulnerabilityproblemusingsoftconstraints-2004","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Simon","N."],"propositions":[],"lastnames":["Foley"],"suffixes":[]},{"firstnames":["Barry"],"propositions":[],"lastnames":["O'Sullivan"],"suffixes":[]}],"editor":[{"firstnames":["Hisham"],"propositions":[],"lastnames":["Haddad"],"suffixes":[]},{"firstnames":["Andrea"],"propositions":[],"lastnames":["Omicini"],"suffixes":[]},{"firstnames":["Roger","L."],"propositions":[],"lastnames":["Wainwright"],"suffixes":[]},{"firstnames":["Lorie","M."],"propositions":[],"lastnames":["Liebrock"],"suffixes":[]}],"title":"Modeling and detecting the cascade vulnerability problem using soft constraints","booktitle":"Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004","pages":"383–390","publisher":"ACM","year":"2004","url":"https://doi.org/10.1145/967900.967984","doi":"10.1145/967900.967984","timestamp":"Tue, 06 Nov 2018 00:00:00 +0100","biburl":"https://dblp.org/rec/conf/sac/BistarelliFO04.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/sac/BistarelliFO04,\n author = {Stefano Bistarelli and\n Simon N. Foley and\n Barry O'Sullivan},\n editor = {Hisham Haddad and\n Andrea Omicini and\n Roger L. Wainwright and\n Lorie M. Liebrock},\n title = {Modeling and detecting the cascade vulnerability problem using soft\n constraints},\n booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),\n Nicosia, Cyprus, March 14-17, 2004},\n pages = {383--390},\n publisher = {{ACM}},\n year = {2004},\n url = {https://doi.org/10.1145/967900.967984},\n doi = {10.1145/967900.967984},\n timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/sac/BistarelliFO04.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bistarelli, S.","Foley, S. N.","O'Sullivan, B."],"editor_short":["Haddad, H.","Omicini, A.","Wainwright, R. L.","Liebrock, L. M."],"key":"DBLP:conf/sac/BistarelliFO04","id":"DBLP:conf/sac/BistarelliFO04","bibbaseid":"bistarelli-foley-osullivan-modelinganddetectingthecascadevulnerabilityproblemusingsoftconstraints-2004","role":"author","urls":{"Paper":"https://doi.org/10.1145/967900.967984"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.833Z","downloads":0,"keywords":[],"search_terms":["modeling","detecting","cascade","vulnerability","problem","using","soft","constraints","bistarelli","foley","o'sullivan"],"title":"Modeling and detecting the cascade vulnerability problem using soft constraints","year":2004,"dataSources":["BdSNx7DFqX9RjWbWF","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y","dYbBqY6vzA8Y5nLL3"]}