共 50 条
- [1] Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 1 - 17
- [3] Detecting Xebsite Vulnerabilities based on Markov Chains Theory [J]. PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2016, : 697 - 700
- [4] Attack Vulnerabilities Analysis of Elgamal Elliptical Curve Based Stegocrypt Using Attack Trees [J]. 2018 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2018, : 290 - 294
- [5] Bayesian Network Construction and Simplified Inference Method Based on Causal Chains [J]. INTELLIGENT HUMAN SYSTEMS INTEGRATION, IHSI 2018, 2018, 722 : 438 - 443
- [6] DoS attack template construction based on attack atomic [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 142 - 150
- [7] An attack detection method based on indicator-dependent model construction and monitoring [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (06): : 2204 - 2233
- [8] A distributed method for DDoS attack tree construction [J]. Zhai, J. (zhaijiqiang@126.com), 1600, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (04): : 538 - 545
- [9] AN IMPROVED METHOD FOR THE COMBINATION OF MODIFIED INSULIN CHAINS [J]. HOPPE-SEYLERS ZEITSCHRIFT FUR PHYSIOLOGISCHE CHEMIE, 1981, 362 (08): : 1043 - 1049