Author of the publication

Improving Attack Graph Visualization through Data Reduction and Attack Grouping.

, , , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 68-79. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable approach to attack graph generation., , and . CCS, page 336-345. ACM, (2006)Improving Attack Graph Visualization through Data Reduction and Attack Grouping., , , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 68-79. Springer, (2008)Ideal Based Cyber Security Technical Metrics for Control Systems., and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 246-260. Springer, (2007)Empirical Estimates and Observations of 0Day Vulnerabilities., , , and . HICSS, page 1-12. IEEE Computer Society, (2009)Time-to-Compromise Model for Cyber Risk Reduction Estimation., , , and . Quality of Protection, volume 23 of Advances in Information Security, Springer, (2006)Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System., , , and . HICSS, IEEE Computer Society, (2006)