共 50 条
- [31] A novel network risk assessment method based on vulnerability correlation graph 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 31 - 34
- [32] Algorithm of generating host-based attack graph for overall network Advances in Information Sciences and Service Sciences, 2011, 3 (08): : 104 - 110
- [33] A Method Based on Global Attack Graph for Network Hardening 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
- [34] A Generation Method of Attack Graph Based on Evolutionary Computation PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
- [35] An Attack Graph Generation Method Based on Parallel Computing SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
- [36] Method of Cyber Attack Attribution Based on Graph Model Ruan Jian Xue Bao/Journal of Software, 2022, 33 (02): : 683 - 698
- [37] Risk Assessment and Diagnostic Method of Sulfate Attack of Cement-based Material ADVANCED BUILDING MATERIALS AND SUSTAINABLE ARCHITECTURE, PTS 1-4, 2012, 174-177 : 121 - +
- [38] Risk Assessment of Information System using the Shell Theory and Attack Graph PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 537 - 541
- [40] Network attack prediction method based on threat intelligence for IoT Multimedia Tools and Applications, 2019, 78 : 30257 - 30270