![]() |
| 2008 | ||
|---|---|---|
| 2 | EE | Yinqian Zhang, Xun Fan, Zhi Xue, Hao Xu: Two Stochastic Models for Security Evaluation Based on Attack Graph. ICYCS 2008: 2198-2203 |
| 2007 | ||
| 1 | EE | Baowen Zhang, W. Zhu, Zhi Xue: Mining Privilege Escalation Paths for Network Vulnerability Analysis. FSKD (4) 2007: 56-60 |
| 1 | Xun Fan | [2] |
| 2 | Hao Xu | [2] |
| 3 | Baowen Zhang | [1] |
| 4 | Yinqian Zhang | [2] |
| 5 | W. Zhu | [1] |