共 50 条
- [32] A Combat Capability Evaluation Method of UAV Swarm Based on Kill Chain [J]. PROCEEDINGS OF 2022 INTERNATIONAL CONFERENCE ON AUTONOMOUS UNMANNED SYSTEMS, ICAUS 2022, 2023, 1010 : 1378 - 1385
- [33] Attack Chains Construction Method Based on Vulnerabilities Combination [J]. International Journal of Network Security, 2022, 24 (03): : 389 - 400
- [34] Attack scenario construction based on rule and fuzzy clustering [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 328 - 333
- [37] Bigram and Unigram Based Text Attack via Adaptive Monotonic Heuristic Search [J]. THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 706 - 714
- [38] Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 1 - 17
- [39] Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 122 - 135
- [40] Frequent subcircuits extraction algorithm based on heuristic chain search [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (06): : 1748 - 1753