Cited By
View all- Schrick NHawrylak P(2024)Application-Level Checkpoint/Restart for Large-Scale Attack and Compliance GraphsSoutheastCon 202410.1109/SoutheastCon52093.2024.10500065(1450-1455)Online publication date: 15-Mar-2024
- Konsta ALluch Lafuente ASpiga BDragoni N(2024)SurveyComputers and Security10.1016/j.cose.2023.103602137:COnline publication date: 1-Feb-2024
- Palma ABonomi S(2023)A Workflow for Distributed and Resilient Attack Graph Generation2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S)10.1109/DSN-S58398.2023.00050(185-187)Online publication date: Jun-2023
- Show More Cited By