共 50 条
- [22] NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2015,
- [23] A Graph-Based Approach for IP Network Analysis [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
- [25] Graph-based analysis of the Bucharest transport network [J]. ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2024, 34 (01): : 59 - 68
- [26] A Heuristic Method of Attack Graph Analysis for Network Security Hardening [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
- [27] An approach to evaluate network security risk based on attack graph [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
- [28] Study of network security evaluation based on attack graph model [J]. Tongxin Xuebao, 2007, 3 (29-34):
- [29] A Quantitative Method for Evaluating Network Security Based on Attack Graph [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
- [30] A review on graph-based approaches for network security monitoring and botnet detection [J]. International Journal of Information Security, 2024, 23 : 119 - 140