共 50 条
- [1] Optimal Network Security Hardening Using Attack Graph Games [J]. PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 526 - 532
- [3] Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1920 - 1937
- [4] An attack graph-based probabilistic security metric [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
- [5] A Heuristic Method of Attack Graph Analysis for Network Security Hardening [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
- [6] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph [J]. AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
- [7] A Multi-Objective Approach for Security Hardening and Probabilistic Vulnerability Assessment on Attack Graphs [J]. 2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 726 - 735
- [8] Optimal security hardening on attack tree models of networks: a cost-benefit analysis [J]. International Journal of Information Security, 2012, 11 : 167 - 188
- [10] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774