共 50 条
- [21] Measuring the overall security of network configurations using attack graphs DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 98 - +
- [22] Motif-Based Attack Detection in Network Communication Graphs COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 206 - 213
- [23] Modeling Modern Network Attacks and Countermeasures Using Attack Graphs 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 117 - 126
- [24] Study on Evaluation Method for Network Survivability Under Intentional Nodes Attack MECHANICAL, CONTROL, ELECTRIC, MECHATRONICS, INFORMATION AND COMPUTER, 2016, : 102 - 108
- [27] How to Attack and Generate Honeywords 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 966 - 983
- [28] An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1777 - 1784
- [29] Augmenting Attack Graphs to Represent Data Link and Network Layer Vulnerabilities MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 1010 - 1015
- [30] Two Scalable Analyses of Compact Attack Graphs for Defending Network Security NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 627 - 632