共 50 条
- [1] Network Security Risk Assessment Method Based on HMM and Attack Graph Model [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
- [2] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
- [3] Risk Assessment Method of IoT Host Based on Attack Graph [J]. MOBILE NETWORKS & APPLICATIONS, 2023,
- [5] Network Vulnerability Assessment based on Attack Graph [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
- [7] Network Security Risk Assessment System Based on Attack Graph and Markov Chain [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
- [8] Heuristic Network Security Risk Based on Attack Graph [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
- [9] A Method Based on Global Attack Graph for Network Hardening [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
- [10] Host security assessment method based on attack graph [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99