@inproceedings{wang:hal-01383345, TITLE = {{A Formal Model for Attack Mutation Using Dynamic Description Logics}}, AUTHOR = {Wang, Zhuxiao and Guo, Jing and Shi, Jin and He, Hui and Zhang, Ying and Peng, Hui and Tian, Guanhua}, URL = {https://inria.hal.science/hal-01383345}, NOTE = {Part 9: Information Security}, BOOKTITLE = {{8th International Conference on Intelligent Information Processing (IIP)}}, ADDRESS = {Hangzhou, China}, EDITOR = {Zhongzhi Shi and Zhaohui Wu and David Leake and Uli Sattler}, PUBLISHER = {{Springer}}, SERIES = {Intelligent Information Processing VII}, VOLUME = {AICT-432}, PAGES = {303-311}, YEAR = {2014}, MONTH = Oct, DOI = {10.1007/978-3-662-44980-6\_34}, KEYWORDS = {Intrusion Detection/Prevention Systems ; Multi-protocol Evasions ; Advanced Evasion Techniques ; Knowledge Representation and Reasoning ; Dynamic Description Logics}, PDF = {https://inria.hal.science/hal-01383345/file/978-3-662-44980-6_34_Chapter.pdf}, HAL_ID = {hal-01383345}, HAL_VERSION = {v1}, }