Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "A Vulnerability Assessment Tool Based on OVAL in System Block Model."
@inproceedings{DBLP:conf/icic/LeeKK06, author = {Geuk Lee and Il Seok Ko and Tai{-}Hoon Kim}, title = {A Vulnerability Assessment Tool Based on {OVAL} in System Block Model}, booktitle = {Intelligent Computing, International Conference on Intelligent Computing, {ICIC} 2006, Kunming, China, August 16-19, 2006. Proceedings, Part {I}}, pages = {1115--1120}, year = {2006}, crossref = {DBLP:conf/icic/2006-1}, url = {https://doi.org/10.1007/11816157\_137}, doi = {10.1007/11816157\_137}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icic/LeeKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icic/2006-1, editor = {De{-}Shuang Huang and Kang Li and George W. Irwin}, title = {Intelligent Computing, International Conference on Intelligent Computing, {ICIC} 2006, Kunming, China, August 16-19, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4113}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11816157}, doi = {10.1007/11816157}, isbn = {3-540-37271-7}, timestamp = {Mon, 09 Sep 2024 01:13:46 +0200}, biburl = {https://dblp.org/rec/conf/icic/2006-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.