Loading…
Detecting Critical Nodes for Efficient Network Vulnerability Management
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Lee, Jinho Yoon, Sungjin Kim, Sunghak Ahn, Seongjin |
description | |
doi_str_mv | 10.1109/CSA.2009.5404196 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5404196</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5404196</ieee_id><sourcerecordid>5404196</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-a3df9274e0c395208a03cc48acdd1e1ccd6315e6742ec3d037f4a11023621003</originalsourceid><addsrcrecordid>eNotkE1LAzEYhANasNa9C17yB3Z987XZHMtaq1DroeK1xORNiW63ko1I_31X7Fzm8jDMDCG3DCrGwNy3m3nFAUylJEhm6gtSGN0wyaWURipxSaacKVNqEDAh13-ogZqz-ooUw_AJo6TiRsOULB8wo8ux39E2xRyd7ej64HGg4ZDoIoToIvaZrjH_HtIXff_pekz2I3YxH-mL7e0O9yNwQybBdgMWZ5-RzePirX0qV6_L53a-KqOBXFrhg-FaIjhhFIfGgnBONtZ5z5A552vBFNZacnTCg9BB2nEyF2N7ADEjd_-pERG33ynubTpuzy-IE1u-TZw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Detecting Critical Nodes for Efficient Network Vulnerability Management</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Lee, Jinho ; Yoon, Sungjin ; Kim, Sunghak ; Ahn, Seongjin</creator><creatorcontrib>Lee, Jinho ; Yoon, Sungjin ; Kim, Sunghak ; Ahn, Seongjin</creatorcontrib><identifier>ISSN: 2159-7030</identifier><identifier>ISBN: 9781424449453</identifier><identifier>ISBN: 1424449456</identifier><identifier>DOI: 10.1109/CSA.2009.5404196</identifier><identifier>LCCN: 2009906216</identifier><language>eng</language><publisher>IEEE</publisher><subject>Complex networks ; Computer network management ; Computer networks ; Computer science education ; Telecommunication traffic ; Testing ; Tree graphs ; Wireless communication</subject><ispartof>2009 2nd International Conference on Computer Science and its Applications, 2009, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5404196$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54530,54895,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5404196$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lee, Jinho</creatorcontrib><creatorcontrib>Yoon, Sungjin</creatorcontrib><creatorcontrib>Kim, Sunghak</creatorcontrib><creatorcontrib>Ahn, Seongjin</creatorcontrib><title>Detecting Critical Nodes for Efficient Network Vulnerability Management</title><title>2009 2nd International Conference on Computer Science and its Applications</title><addtitle>CSA</addtitle><subject>Complex networks</subject><subject>Computer network management</subject><subject>Computer networks</subject><subject>Computer science education</subject><subject>Telecommunication traffic</subject><subject>Testing</subject><subject>Tree graphs</subject><subject>Wireless communication</subject><issn>2159-7030</issn><isbn>9781424449453</isbn><isbn>1424449456</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkE1LAzEYhANasNa9C17yB3Z987XZHMtaq1DroeK1xORNiW63ko1I_31X7Fzm8jDMDCG3DCrGwNy3m3nFAUylJEhm6gtSGN0wyaWURipxSaacKVNqEDAh13-ogZqz-ooUw_AJo6TiRsOULB8wo8ux39E2xRyd7ej64HGg4ZDoIoToIvaZrjH_HtIXff_pekz2I3YxH-mL7e0O9yNwQybBdgMWZ5-RzePirX0qV6_L53a-KqOBXFrhg-FaIjhhFIfGgnBONtZ5z5A552vBFNZacnTCg9BB2nEyF2N7ADEjd_-pERG33ynubTpuzy-IE1u-TZw</recordid><startdate>200912</startdate><enddate>200912</enddate><creator>Lee, Jinho</creator><creator>Yoon, Sungjin</creator><creator>Kim, Sunghak</creator><creator>Ahn, Seongjin</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200912</creationdate><title>Detecting Critical Nodes for Efficient Network Vulnerability Management</title><author>Lee, Jinho ; Yoon, Sungjin ; Kim, Sunghak ; Ahn, Seongjin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-a3df9274e0c395208a03cc48acdd1e1ccd6315e6742ec3d037f4a11023621003</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Complex networks</topic><topic>Computer network management</topic><topic>Computer networks</topic><topic>Computer science education</topic><topic>Telecommunication traffic</topic><topic>Testing</topic><topic>Tree graphs</topic><topic>Wireless communication</topic><toplevel>online_resources</toplevel><creatorcontrib>Lee, Jinho</creatorcontrib><creatorcontrib>Yoon, Sungjin</creatorcontrib><creatorcontrib>Kim, Sunghak</creatorcontrib><creatorcontrib>Ahn, Seongjin</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lee, Jinho</au><au>Yoon, Sungjin</au><au>Kim, Sunghak</au><au>Ahn, Seongjin</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Detecting Critical Nodes for Efficient Network Vulnerability Management</atitle><btitle>2009 2nd International Conference on Computer Science and its Applications</btitle><stitle>CSA</stitle><date>2009-12</date><risdate>2009</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>2159-7030</issn><isbn>9781424449453</isbn><isbn>1424449456</isbn><pub>IEEE</pub><doi>10.1109/CSA.2009.5404196</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2159-7030 |
ispartof | 2009 2nd International Conference on Computer Science and its Applications, 2009, p.1-6 |
issn | 2159-7030 |
language | eng |
recordid | cdi_ieee_primary_5404196 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Complex networks Computer network management Computer networks Computer science education Telecommunication traffic Testing Tree graphs Wireless communication |
title | Detecting Critical Nodes for Efficient Network Vulnerability Management |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T13%3A43%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Detecting%20Critical%20Nodes%20for%20Efficient%20Network%20Vulnerability%20Management&rft.btitle=2009%202nd%20International%20Conference%20on%20Computer%20Science%20and%20its%20Applications&rft.au=Lee,%20Jinho&rft.date=2009-12&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=2159-7030&rft.isbn=9781424449453&rft.isbn_list=1424449456&rft_id=info:doi/10.1109/CSA.2009.5404196&rft_dat=%3Cieee_6IE%3E5404196%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-a3df9274e0c395208a03cc48acdd1e1ccd6315e6742ec3d037f4a11023621003%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5404196&rfr_iscdi=true |