共 50 条
- [2] A vulnerability analysis method for critical elements based on network connectivity [J]. Kongzhi yu Juece/Control and Decision, 2020, 35 (06): : 1421 - 1426
- [3] Data network structural vulnerability analysis method [J]. Zhang, X.-Y. (13660077018@139.com), 1600, Beijing University of Posts and Telecommunications (20):
- [4] Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge Graph Vulnerability Analysis and Reinforcement Verification Mechanism of Network Routing Mechanism based on Knowledge Graph [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 39 - 43
- [5] Security Vulnerability Analysis Assessment Method of Power Information Network [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 372 - 380
- [8] Network vulnerability analysis [J]. 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, 2002, : 493 - 495
- [9] Network Threat Analysis based on Vulnerability Relation Model [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 357 - 368
- [10] Model-based vulnerability analysis of IMS network [J]. Journal of Networks, 2009, 4 (04) : 254 - 262