Quality of Protection
DOI: 10.1007/978-0-387-36584-8_6
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the risk of using vulnerable components

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0
1

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 37 publications
(35 citation statements)
references
References 9 publications
0
34
0
1
Order By: Relevance
“…There are thus two different ways for breaking the cycle among which we can only choose one. That is, we can either remove the edge from e 4 …”
Section: Fig 3 Cycles In Attack Graphsmentioning
confidence: 99%
See 4 more Smart Citations
“…There are thus two different ways for breaking the cycle among which we can only choose one. That is, we can either remove the edge from e 4 …”
Section: Fig 3 Cycles In Attack Graphsmentioning
confidence: 99%
“…Referring to the right-hand side of Figure 3, the search will reach c 3 from e 1 (or, reach c 4 from e 2 ) and then stop there, because the predecessor e 3 of c 4 (or, the predecessor e 4 of c 3 ) has not yet been, and will never be, reached. Notice that this is true no matter a cycle is removable (such as in the left-hand side of Figure 3) or not.…”
Section: Computing the Metricmentioning
confidence: 99%
See 3 more Smart Citations