Author of the publication

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.

, , , , and . IEEE Trans. Dependable Secur. Comput., 11 (1): 30-44 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review of Graph Approaches to Network Security Analytics.. From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 300-323. Springer, (2018)Co-Citation count vs correlation for influence network visualization., , and . Inf. Vis., 2 (3): 160-170 (2003)Document Clustering, Visualization, and Retrieval Link Mining., , and . Clustering and Information Retrieval, Kluwer, (2003)Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances., , and . ACSAC, page 350-359. IEEE Computer Society, (2004)Mission-focused cyber situational understanding via graph analytics., , , , , and . CyCon, page 427-448. IEEE, (2018)Managing attack graph complexity through visual hierarchical aggregation., and . VizSEC, page 109-118. ACM, (2004)Dependency-Based Link Prediction for Learning Microsegmentation Policy., and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 569-588. Springer, (2022)Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination., , , , and . Neural Networks, 16 (5-6): 907-914 (2003)Topological Vulnerability Analysis., and . Cyber Situational Awareness, volume 46 of Advances in Information Security, Springer, (2010)k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks., , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 573-587. Springer, (2010)