Cited By
View all- Malzahn DBirnbaum ZWright-Hamor C(2020)Automated Vulnerability Testing via Executable Attack Graphs2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)10.1109/CyberSecurity49315.2020.9138852(1-10)Online publication date: Jun-2020
- Birnbaum ZDavis MSalman SCervini JWatkins LYamajala SPaul S(2020)Cyber-Resilient SCADA Systems via Secure State RestorationCritical Infrastructure Protection XIV10.1007/978-3-030-62840-6_9(183-207)Online publication date: 15-Dec-2020
- S RR RMoharir MG S(2018)SCAPY- A powerful interactive packet manipulation program2018 International Conference on Networking, Embedded and Wireless Systems (ICNEWS)10.1109/ICNEWS.2018.8903954(1-5)Online publication date: Dec-2018