共 50 条
- [3] Detection algorithm for multi-step attack based on CTPN [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1383 - 1391
- [5] Real-Time Risk Assessment of Network Security Based on Attack Graphs [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMPUTER APPLICATIONS (ICSA 2013), 2013, 92 : 75 - 80
- [6] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
- [7] An Attack Graph-based On-line Multi-step Attack Detector [J]. ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
- [9] Security Assessment of Computer Networks Based on Attack Graphs and Security Events [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471
- [10] A systematic survey on multi-step attack detection [J]. COMPUTERS & SECURITY, 2018, 76 : 214 - 249