A soft constraint-based approach to the cascade vulnerability problem (2005)

by S Bistarelli, S N Foley, B O’Sullivan
Venue:Journal of Computer Security