IV Kotenko, E Doynikova - J. Wirel. Mob. Networks Ubiquitous Comput …, 2014 - isyou.info
The paper is devoted to the security assessment problem. Authors suggest an approach to the security assessment based on the attack graphs that can be implemented in …