Skip to main navigation Skip to search Skip to main content

Using Exploitation Graphs to Model Network Exploitations

    Research output: Contribution to conferencePresentation

    Original languageAmerican English
    StatePublished - Jul 1 2005
    Event2005 Symposium on Risk Management and Cyber-Informatics -
    Duration: Jul 1 2005 → …

    Conference

    Conference2005 Symposium on Risk Management and Cyber-Informatics
    Period7/1/05 → …

    Disciplines

    • Computer Sciences

    Cite this