![]() | ![]() |
2006 | ||
---|---|---|
3 | EE | Igor V. Kotenko, Mikhail Stepashkin: Attack Graph Based Evaluation of Network Security. Communications and Multimedia Security 2006: 216-227 |
2 | Igor V. Kotenko, Mikhail Stepashkin: Network Security Evaluation Based on Simulation of Malfactor's Behavior. SECRYPT 2006: 339-344 | |
2005 | ||
1 | EE | Igor V. Kotenko, Mikhail Stepashkin: Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. MMM-ACNS 2005: 311-324 |
1 | Igor V. Kotenko | [1] [2] [3] |