Author of the publication

Ranking Attack Graphs.

, , , , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 127-144. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Evaluation of Hot-Potato Routing Algorithms on 2-Dimensional Processor Arrays (Research Note)., , , and . Euro-Par, volume 1900 of Lecture Notes in Computer Science, page 877-881. Springer, (2000)Efficient Image Computation in Infinite State Model Checking., and . CAV, volume 2725 of Lecture Notes in Computer Science, page 249-261. Springer, (2003)Counter machines and the safety and disjointness problems for database queries with linear constraints., , and . Where Mathematics, Computer Science, Linguistics and Biology Meet, page 127-137. Kluwer Academic Publishers, (2001)Construction of Efficient BDDs for Bounded Arithmetic Constraints., and . TACAS, volume 2619 of Lecture Notes in Computer Science, page 394-408. Springer, (2003)Ranking Attack Graphs., , , , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 127-144. Springer, (2006)Action Language Verifier, Extended., , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 413-417. Springer, (2005)Widening Arithmetic Automata., and . CAV, volume 3114 of Lecture Notes in Computer Science, page 321-333. Springer, (2004)Satisfiability Checking of Non-clausal Formulas Using General Matings., , and . SAT, volume 4121 of Lecture Notes in Computer Science, page 75-89. Springer, (2006)Automata-Based Representations for Arithmetic Constraints in Automated Verification., and . CIAA, volume 2608 of Lecture Notes in Computer Science, page 282-288. Springer, (2002)