共 50 条
- [3] Applying Attack Graphs to Network Security Metric [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
- [4] The Effect Evaluation of the Network Attack Based on the Fuzzy Comprehensive Evaluation Method [J]. 2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 367 - 371
- [6] Application of Fuzzy AHP Method in the Effect Evaluation of Network Attack [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23
- [7] GENERATING NETWORK ATTACK GRAPHS FOR SECURITY ALERT CORRELATION [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 220 - 225
- [8] Toward Measuring Network Security Using Attack Graphs [J]. QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 49 - 54
- [9] Network Security Situation Evaluation Method Based on Attack Intention Recognition [J]. PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 919 - 924
- [10] A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps [J]. International Journal of Information and Computer Security, 2021, 14 (3-4): : 242 - 262