Author of the publication

An OVAL-based active vulnerability assessment system for enterprise computer networks.

, , and . Information Systems Frontiers, 10 (5): 573-588 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Fine-Grained Access Control for Cloud., , and . ICEBE, page 286-291. IEEE Computer Society, (2014)Community Detection Using Label Propagation in Entropic Order., , and . CIT, page 18-24. IEEE Computer Society, (2012)Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork., , , and . Journal Comp. Netw. and Communic., (2011)Network Vulnerability Analysis Using Text Mining., , and . ACIIDS (2), volume 7197 of Lecture Notes in Computer Science, page 274-283. Springer, (2012)A new genetics-based diffusion model for social networks., , and . CASoN, page 76-81. IEEE, (2011)Building network attack graph for alert causal correlation., , , and . Computers & Security, 27 (5-6): 188-196 (2008)An Approach to Privacy-Preserving Alert Correlation and Analysis., , and . APSCC, page 620-624. IEEE Computer Society, (2010)Chinese SNS blog classification using semantic similarity., , , and . CASoN, page 1-6. IEEE, (2013)Multiple evidence fusion based information diffusion model for social network., , , and . ChinaCom, page 102-105. IEEE, (2014)Authoritative Scholarly Paper Recommendation Based on Paper Communities., , and . CSE, page 1536-1540. IEEE Computer Society, (2014)