Cited By
View all- Dai JChen Y(2021)Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory2021 17th International Conference on Computational Intelligence and Security (CIS)10.1109/CIS54983.2021.00107(489-492)Online publication date: Nov-2021
- Gamarra MShetty SNicol DNjilla LGonzalez O(2019)Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure2019 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM38437.2019.9014266(1-7)Online publication date: Dec-2019
- Baiardi F(2019)Avoiding the weaknesses of a penetration testComputer Fraud & Security10.1016/S1361-3723(19)30041-72019:4(11-15)Online publication date: Apr-2019
- Show More Cited By