Cited By
View all- Weaver GMarla LJohansson BJain S(2018)Cyber-physical simulation and optimal mitigation for shipping port operationsProceedings of the 2018 Winter Simulation Conference10.5555/3320516.3320844(2747-2758)Online publication date: 9-Dec-2018
- Nichols WHill ZHawrylak PHale JPapa M(2018)Automatic Generation of Attack Scripts from Attack Graphs2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00050(267-274)Online publication date: Apr-2018
- Noel S(2018)A Review of Graph Approaches to Network Security AnalyticsFrom Database to Cyber Security10.1007/978-3-030-04834-1_16(300-323)Online publication date: 30-Nov-2018
- Show More Cited By