共 50 条
- [1] Heuristic Network Security Risk Based on Attack Graph [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
- [2] Optimal Network Security Hardening Using Attack Graph Games [J]. PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 526 - 532
- [3] A Method Based on Global Attack Graph for Network Hardening [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
- [4] Analytical Approach to Attack Graph Analysis for Network Security [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 25 - 32
- [5] A Quantitative Method for Evaluating Network Security Based on Attack Graph [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
- [6] Optimal Security Hardening over a Probabilistic Attack Graph [J]. SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 21 - 30
- [8] Complex Network Security Analysis based on Attack Graph Model [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
- [9] IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in aWeighted Attack Graph [J]. PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 315 - 326
- [10] Exploiting Domination in Attack Graph for Enterprise Network Hardening [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 342 - 353