L Wang, T Islam, T Long, A Singhal, S Jajodia - Data and Applications Security … - Springer
To protect critical resources in today's networked environments, it is desirable to quantify the
likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now …