A Vulnerability Attack Graph Generation Method Based on Scripts. Han, B., Wang, Q., Yu, F., & Zhang 0002, X. In Proceedings of ICICA (LNCS), pages 45-50, 2012. Paper bibtex @inproceedings{ dblp2365947,
title = {A Vulnerability Attack Graph Generation Method Based on Scripts},
author = {Bo Han and Qing Wang and Fajiang Yu and Xianda Zhang 0002},
author_short = {Han, B. and Wang, Q. and Yu, F. and Zhang 0002, X.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2012},
key = {dblp2365947},
id = {dblp2365947},
biburl = {http://www.dblp.org/rec/bibtex/conf/icica/HanWYZ12},
url = {http://dx.doi.org/10.1007/978-3-642-34062-8_6},
conference = {ICICA (LNCS)},
pages = {45-50},
text = {ICICA (LNCS) 2012:45-50},
booktitle = {Proceedings of ICICA (LNCS)}
}
Downloads: 0
{"_id":"6ni8zphsRe7RGM7Cb","bibbaseid":"han-wang-yu-zhang0002-avulnerabilityattackgraphgenerationmethodbasedonscripts-2012","downloads":0,"creationDate":"2015-10-27T10:09:39.079Z","title":"A Vulnerability Attack Graph Generation Method Based on Scripts","author_short":["Han, B.","Wang, Q.","Yu, F.","Zhang 0002, X."],"year":2012,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/icica/HanWYZ12","bibdata":{"title":"A Vulnerability Attack Graph Generation Method Based on Scripts","author":["Bo Han","Qing Wang","Fajiang Yu","Xianda Zhang 0002"],"author_short":["Han, B.","Wang, Q.","Yu, F.","Zhang 0002, X."],"bibtype":"inproceedings","type":"inproceedings","year":"2012","key":"dblp2365947","id":"dblp2365947","biburl":"http://www.dblp.org/rec/bibtex/conf/icica/HanWYZ12","url":"http://dx.doi.org/10.1007/978-3-642-34062-8_6","conference":"ICICA (LNCS)","pages":"45-50","text":"ICICA (LNCS) 2012:45-50","booktitle":"Proceedings of ICICA (LNCS)","bibtex":"@inproceedings{ dblp2365947,\n title = {A Vulnerability Attack Graph Generation Method Based on Scripts},\n author = {Bo Han and Qing Wang and Fajiang Yu and Xianda Zhang 0002},\n author_short = {Han, B. and Wang, Q. and Yu, F. and Zhang 0002, X.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2012},\n key = {dblp2365947},\n id = {dblp2365947},\n biburl = {http://www.dblp.org/rec/bibtex/conf/icica/HanWYZ12},\n url = {http://dx.doi.org/10.1007/978-3-642-34062-8_6},\n conference = {ICICA (LNCS)},\n pages = {45-50},\n text = {ICICA (LNCS) 2012:45-50},\n booktitle = {Proceedings of ICICA (LNCS)}\n}","bibbaseid":"han-wang-yu-zhang0002-avulnerabilityattackgraphgenerationmethodbasedonscripts-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-642-34062-8_6"},"downloads":0},"search_terms":["vulnerability","attack","graph","generation","method","based","scripts","han","wang","yu","zhang 0002"],"keywords":[],"authorIDs":[],"dataSources":["s4JSkT3pFL5cFapEf"]}