Method based on GSCPN for network vulnerability analysis

被引:1
|
作者
Gao, Xiang [1 ]
Zhu, Yue-Fei [1 ]
Fei, Jin-Long [1 ]
Han, Tao [1 ]
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450002, China
关键词
19;
D O I
10.4304/jsw.8.8.2032-2038
中图分类号
学科分类号
摘要
引用
收藏
页码:2032 / 2038
相关论文
共 50 条
  • [1] Vulnerability Analysis Method Based on Network and Copula Entropy
    Chen, Mengyuan
    Liu, Jilan
    Zhang, Ning
    Zheng, Yichao
    [J]. ENTROPY, 2024, 26 (03)
  • [2] A vulnerability analysis method for critical elements based on network connectivity
    Liu, Shu-Mei
    Yu, Yao
    Guo, Lei
    [J]. Kongzhi yu Juece/Control and Decision, 2020, 35 (06): : 1421 - 1426
  • [3] Data network structural vulnerability analysis method
    [J]. Zhang, X.-Y. (13660077018@139.com), 1600, Beijing University of Posts and Telecommunications (20):
  • [4] Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge Graph Vulnerability Analysis and Reinforcement Verification Mechanism of Network Routing Mechanism based on Knowledge Graph
    Zhang, Yu
    Zhuang, Yi
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 39 - 43
  • [5] Security Vulnerability Analysis Assessment Method of Power Information Network
    Zhao, Yong-bin
    Zhang, Tao
    Zhang, Bo
    Hou, Jun
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 372 - 380
  • [6] A software vulnerability detection method based on deep learning with complex network analysis and subgraph partition
    Cai, Wenjing
    Chen, Junlin
    Yu, Jiaping
    Gao, Lipeng
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 164
  • [7] Vulnerability analysis of a natural gas pipeline network based on network flow
    Wang, WuChang
    Zhang, Yi
    Li, YuXing
    Liu, Chengsong
    Han, Shiying
    [J]. INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING, 2020, 188
  • [8] Network vulnerability analysis
    Skaggs, B
    Blackburn, B
    Manes, G
    Shenoi, S
    [J]. 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III, CONFERENCE PROCEEDINGS, 2002, : 493 - 495
  • [9] Network Threat Analysis based on Vulnerability Relation Model
    Wang, Zhihong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 357 - 368
  • [10] Model-based vulnerability analysis of IMS network
    Wang, Dong
    Liu, Chen
    [J]. Journal of Networks, 2009, 4 (04) : 254 - 262