共 50 条
- [31] AI planning-based approach of attack graph generation [J]. Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (05): : 460 - 465
- [32] Design Procedure of Knowledge Base for Practical Attack Graph Generation [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 594 - 601
- [33] Research on Automatic Generation and Analysis Technology of Network Attack Graph [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 133 - 139
- [34] An Attack Graph Generation Method Based on Heuristic Searching Strategy [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1180 - 1185
- [39] Study of Generating Attack Graph based on Privilege Escalation for Computer Networks [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1213 - 1217
- [40] Automatic Discovery of Attack Messages and Pre- and Post-Conditions for Attack Graph Generation [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 378 - 387