Cited By
View all- Noel S(2025)Topological Vulnerability AnalysisEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1777(2629-2632)Online publication date: 8-Jan-2025
- Zaber M(2025)Attack GraphsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1497(118-121)Online publication date: 8-Jan-2025
- Lee JJung SCheagal DJang JShin D(2024)Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability MatrixElectronics10.3390/electronics1319392113:19(3921)Online publication date: 3-Oct-2024
- Show More Cited By