共 50 条
- [1] A New Method to Generate Attack Graphs 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 401 - 406
- [2] An effective method to generate attack graph PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3926 - 3931
- [3] A novel method of constituting network security policy based on attack graphs Ma, J. (chenshan1223@126.com), 1600, Inst. of Scientific and Technical Information of China (22): : 374 - 381
- [5] Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps INTELLIGENT DECISION TECHNOLOGIES (IDT'2012), VOL 2, 2012, 16 : 433 - 440
- [6] Multiple coordinated views for network attack graphs IEEE Workshop on Visualization for Computer Security 2005, Proceedings, 2005, : 99 - 106
- [7] Applying Attack Graphs to Network Security Metric MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
- [8] Fast network attack modeling and security evaluation based on attack graphs 1600, River Publishers (03): : 27 - 46
- [10] Towards Using Boolean Operators on Graphs to Generate Network Topologies 2015 SBMO/IEEE MTT-S INTERNATIONAL MICROWAVE AND OPTOELECTRONICS CONFERENCE (IMOC), 2015,