共 50 条
- [1] Overview on Attack Graph Generation and Visualization Technology [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
- [2] Attack Graph Generation, Visualization and Analysis: Issues and Challenges [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 379 - 390
- [3] Naggen: a Network Attack Graph GENeration Tool [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
- [4] Practical attack graph generation for network defense [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
- [5] Generation and Risk Analysis of Network Attack Graph [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
- [6] ENHANCING INDUSTRIAL CONTROL NETWORK SECURITY THROUGH VULNERABILITY DETECTION AND ATTACK GRAPH ANALYSIS [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 65 - 74
- [7] Research on attack graph generation for network security situation [J]. Adv. Intell. Sys. Comput., (1147-1154):
- [10] Security risk control of water power generation industrial control network based on attack and defense map [J]. 2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 232 - 236