Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 2 publications
references
References 25 publications
0
2
0
Order By: Relevance
“…It executes Planner at the lowlevel by performing automatic modification of fact.pddl. In [26], the authors have defined various data structures used in these algorithms. A brief description of the algorithms has Host3) 3)))) also been given.…”
Section: Attack Path Enumeration Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…It executes Planner at the lowlevel by performing automatic modification of fact.pddl. In [26], the authors have defined various data structures used in these algorithms. A brief description of the algorithms has Host3) 3)))) also been given.…”
Section: Attack Path Enumeration Algorithmmentioning
confidence: 99%
“…Since each solution is an attack path, a set of all acyclic paths may be obtained. A customized attack path enumeration algorithm (refer to Algorithm 1) given in [26] is used in this paper. It executes Planner at the lowlevel by performing automatic modification of fact.pddl.…”
Section: Attack Path Enumeration Algorithmmentioning
confidence: 99%