Conduit cascades and secure synchronization
Proceedings of the 2000 workshop on New security paradigms
Modeling and detecting the cascade vulnerability problem using soft constraints
Proceedings of the 2004 ACM symposium on Applied computing
A soft constraint-based approach to the cascade vulnerability problem
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
IAAI'04 Proceedings of the 16th conference on Innovative applications of artifical intelligence
Hi-index | 0.00 |