|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 12 occurrences of 11 keywords
|
|
|
Results
Found 15 publication records. Showing 15 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
214 | Michael Yanguo Liu, Issa Traoré |
Empirical relation between coupling and attackability in software systems: : a case study on DOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 57-64, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software quality, software metrics, denial of service, attackability, security engineering |
59 | Yanguo Liu, Issa Traoré, Alexander M. Hoole |
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1231-1238, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Melanie Tupper, Nur Zincir-Heywood |
VEA-bility Security Metric: A Network Security Analysis Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 950-957, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network security, Attackability, Vulnerability, security metric, attack graphs, exploit, Exploitability, quantitative measure |
32 | Vishnu Renganathan, Qadeer Ahmed, Daniel Jung 0002 |
Enhancing the Security of Automotive Systems Using Attackability Index. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Veh. ![In: IEEE Trans. Intell. Veh. 9(1), pp. 315-327, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Vyas Raina, Mark J. F. Gales |
Sample Attackability in Natural Language Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.12043, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Henry Prakken |
Formalising an Aspect of Argument Strength: Degrees of Attackability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMMA ![In: Computational Models of Argument - Proceedings of COMMA 2022, Cardiff, Wales, UK, 14-16 September 2022, pp. 296-307, 2022, IOS Press, 978-1-64368-306-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Chengshuai Shi, Cong Shen 0001 |
An Attackability Perspective on No-Sensing Adversarial Multi-player Multi-armed Bandits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021, pp. 533-538, 2021, IEEE, 978-1-5386-8209-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Zhuo Yang, Yufei Han, Xiangliang Zhang 0001 |
Characterizing the Evasion Attackability of Multi-label Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2-9, 2021, pp. 10647-10655, 2021, AAAI Press, 978-1-57735-866-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Zhuo Yang, Yufei Han, Xiangliang Zhang 0001 |
Characterizing the Evasion Attackability of Multi-label Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.09427, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
32 | Amir Khazraei, Miroslav Pajic |
Perfect Attackability of Linear Dynamical Systems with Bounded Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: 2020 American Control Conference, ACC 2020, Denver, CO, USA, July 1-3, 2020, pp. 749-754, 2020, IEEE, 978-1-5386-8266-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Yutong Wang, Yufei Han, Hongyan Bao, Yun Shen, Fenglong Ma, Jin Li 0002, Xiangliang Zhang 0001 |
Attackability Characterization of Adversarial Evasion Attack on Discrete Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, CA, USA, August 23-27, 2020, pp. 1415-1425, 2020, ACM, 978-1-4503-7998-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Sean Weerakkody, Xiaofei Liu, Sang H. Son 0001, Bruno Sinopoli |
A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Control. Netw. Syst. ![In: IEEE Trans. Control. Netw. Syst. 4(1), pp. 60-70, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Sean Weerakkody, Xiaofei Liu, Sang H. Son 0001, Bruno Sinopoli |
A graph theoretic characterization of perfect attackability and detection in Distributed Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: 2016 American Control Conference, ACC 2016, Boston, MA, USA, July 6-8, 2016, pp. 1171-1178, 2016, IEEE, 978-1-4673-8682-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Sean Weerakkody, Xiaofei Liu, Sang H. Son 0001, Bruno Sinopoli |
A Graph Theoretic Characterization of Perfect Attackability and Detection in Distributed Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1510.04712, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
32 | Hasan Cam, Pierre Mouallem, Yilin Mo, Bruno Sinopoli, Benjamin Nkrumah |
Modeling impact of attacks, recovery, and attackability conditions for situational awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSIMA ![In: IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2014, San Antonio, TX, USA, March 3-6, 2014, pp. 181-187, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #15 of 15 (100 per page; Change: )
|
|