Published in

2015 11th International Conference on Innovations in Information Technology (IIT)

DOI: 10.1109/innovations.2015.7381519

Links

Tools

Export citation

Search in Google Scholar

Identifying interdependencies using attack graph generation methods

Proceedings article published in 2015 by Kirsty E. Lever, Kashif Kifayat, Madjid Merabti
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO