Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX record conf/ispec/LuSHSHYT09
@inproceedings{DBLP:conf/ispec/LuSHSHYT09, author = {Liang Lu and Reihaneh Safavi{-}Naini and Markus Hagenbuchner and Willy Susilo and Jeffrey Horton and Sweah Liang Yong and Ah Chung Tsoi}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Ranking Attack Graphs with Graph Neural Networks}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {345--359}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_30}, doi = {10.1007/978-3-642-00843-6\_30}, timestamp = {Sat, 19 Aug 2023 18:10:10 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LuSHSHYT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.