Author Login Chief Editor Login Reviewer Login Editor Login Remote Office
Optimization Method for Attack Graph Based on Vulnerability Exploit Correlation
LI Qiang-Peng, ZHENG Lian-Qing, ZHANG Chuan-Rong, YANG Tong
Computer Engineering . 2012, (21): 129 -132 .  DOI: 10.3969/j.issn.1000-3428.2012.21.035