![]() |
| 2006 | ||
|---|---|---|
| 3 | EE | Igor V. Kotenko, Mikhail Stepashkin: Attack Graph Based Evaluation of Network Security. Communications and Multimedia Security 2006: 216-227 |
| 2 | Igor V. Kotenko, Mikhail Stepashkin: Network Security Evaluation Based on Simulation of Malfactor's Behavior. SECRYPT 2006: 339-344 | |
| 2005 | ||
| 1 | EE | Igor V. Kotenko, Mikhail Stepashkin: Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. MMM-ACNS 2005: 311-324 |
| 1 | Igor V. Kotenko | [1] [2] [3] |