Cited By
View all- Sun XDai JLiu PSinghal AYen J(2018)Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack PathsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.282109513:10(2506-2521)Online publication date: Oct-2018
- Mao WCai ZTowsley DFeng QGuan X(2017)Security importance assessment for system objects and malware detectionComputers and Security10.1016/j.cose.2017.02.00968:C(47-68)Online publication date: 1-Jul-2017
- Uzun EParlato GAtluri VFerrara AVaidya JSural SLorenzi D(2017)Preventing Unauthorized Data FlowsData and Applications Security and Privacy XXXI10.1007/978-3-319-61176-1_3(41-62)Online publication date: 22-Jun-2017
- Show More Cited By