共 50 条
- [21] RFID System Security Assessment Methodology Based on Attack Graph Model PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1161 - 1166
- [22] Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 53 - 61
- [24] Home Health Care vulnerability assessment using graph theory and matrix methods IFAC PAPERSONLINE, 2017, 50 (01): : 4623 - 4629
- [27] Network Vulnerability Assessment based on Attack Graph 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
- [29] Security Risk Assessment of Server Hardware Architectures using Graph Analysis PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
- [30] Vulnerability assessment of information system based on weighted directional graph and complex network technology 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):