共 50 条
- [1] Risk Assessment Method of IoT Host Based on Attack Graph MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1504 - 1513
- [2] Host security assessment method based on attack graph Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
- [3] A Distributed network risk assessment method based on attack graph INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
- [5] A Novel Method for Host Risk Assessment Based on Predecessor Attack INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2011), 2011, 8285
- [6] Network Security Risk Assessment Method Based on HMM and Attack Graph Model 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
- [8] Scalable Attack Graph for Risk Assessment ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82
- [9] Attack Graph - based Vulnerability Assessment of Rank Property in RPL-6LOWPAN in IoT 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 308 - 313