共 50 条
- [41] Using Bounded Binary Particle Swarm Optimization to Analyze Network Attack Graphs ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
- [42] Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 330 - 348
- [43] A Method Based on Global Attack Graph for Network Hardening 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
- [44] A Method of Evaluating Network Attack Probability based on TWDS PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1238 - 1243
- [45] Research of Detection Method of Server Network Storm Attack PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2015, 6 : 48 - 51
- [46] Analysis method for network-based attack scenarios Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (04):
- [47] An Network Attack Modeling Method Based on MLL-AT 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 470 - 473
- [48] Design Method for Virtual Network Attack and Defense Platform CONFERENCE ON MODELING, IDENTIFICATION AND CONTROL, 2012, 3 : 335 - 340
- [49] Network Attack Prediction Method Based on Threat Intelligence CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160
- [50] A Covert Network Attack Detection Method Based on LSTM PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1690 - 1693