Author of the publication

Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs.

, , , and . ACSAC, page 86-95. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Co-Citation count vs correlation for influence network visualization., , and . Information Visualization, 2 (3): 160-170 (2003)Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances., , and . ACSAC, page 350-359. IEEE Computer Society, (2004)Document Clustering, Visualization, and Retrieval Link Mining., , and . Clustering and Information Retrieval, Kluwer, (2003)A Review of Graph Approaches to Network Security Analytics.. From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 300-323. Springer, (2018)Managing attack graph complexity through visual hierarchical aggregation., and . VizSEC, page 109-118. ACM, (2004)Mission-focused cyber situational understanding via graph analytics., , , , , and . CyCon, page 427-448. IEEE, (2018)Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices., and . ACSAC, page 160-169. IEEE Computer Society, (2005)Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153., , , , , , , , , and 14 other author(s). CoRR, (2018)Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination., , , , and . Neural Networks, 16 (5-6): 907-914 (2003)Topological Vulnerability Analysis., and . Cyber Situational Awareness, volume 46 of Advances in Information Security, Springer, (2010)