![]() | ![]() |
2008 | ||
---|---|---|
2 | EE | Yinqian Zhang, Xun Fan, Zhi Xue, Hao Xu: Two Stochastic Models for Security Evaluation Based on Attack Graph. ICYCS 2008: 2198-2203 |
2007 | ||
1 | EE | Baowen Zhang, W. Zhu, Zhi Xue: Mining Privilege Escalation Paths for Network Vulnerability Analysis. FSKD (4) 2007: 56-60 |
1 | Xun Fan | [2] |
2 | Hao Xu | [2] |
3 | Baowen Zhang | [1] |
4 | Yinqian Zhang | [2] |
5 | W. Zhu | [1] |