Author of the publication

Evaluating Network Security With Two-Layer Attack Graphs.

, , , , and . ACSAC, page 127-136. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tang, Cong
add a person with the name Tang, Cong
 

Other publications of authors with the same name

Evaluating Network Security With Two-Layer Attack Graphs., , , , and . ACSAC, page 127-136. IEEE Computer Society, (2009)On the Privacy of Peer-Assisted Distribution of Security Patches., , , , and . Peer-to-Peer Computing, page 1-10. IEEE, (2010)Welding of High Entropy Alloys - A Review., , , , , , and . Entropy, 21 (4): 431 (2019)Need for Symmetry: Addressing Privacy Risks in Online Social Networks., , , , , , and . AINA, page 534-541. IEEE Computer Society, (2011)SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks., , , , , , and . ICNS, page 296-302. IEEE Computer Society, (2009)An Adjacency Matrixes-Based Model for Network Security Analysis., , , , , and . ICC, page 1-5. IEEE, (2010)Towards privacy-preserving RFID-based location-based services., , , , and . FSKD, page 2827-2831. IEEE, (2012)A holistic mechanism against file pollution in peer-to-peer networks., , , , , and . SAC, page 28-34. ACM, (2009)Making Tagging Systems Resistant to Tricky Spam Attacks., , , and . UIC/ATC/ScalCom, page 871-879. IEEE Computer Society, (2015)Vulnerabilities Scoring Approach for Cloud SaaS., , , and . UIC/ATC/ScalCom, page 1339-1347. IEEE, (2015)