Author Login Editor-in-Chief Peer Review Editor Work Office Work
Optimization Method for Attack Graph Based on Vulnerability Exploit Correlation
LI Qiang-Peng, ZHENG Lian-Qing, ZHANG Chuan-Rong, YANG Tong
Computer Engineering . 2012, (21): 129 -132 .  DOI: 10.3969/j.issn.1000-3428.2012.21.035