共 50 条
- [41] Study of network security evaluation based on attack graph model [J]. Tongxin Xuebao, 2007, 3 (29-34):
- [42] A Quantitative Method for Evaluating Network Security Based on Attack Graph [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
- [44] Complex Network Security Analysis based on Attack Graph Model [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
- [46] An Attack Graph Based Metric for Security Evaluation of Computer Networks [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1094 - 1098
- [47] Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 38 - 47
- [48] Probabilistic Graph Security for Networked Multi-Robot Systems [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), 2018, : 7646 - 7653
- [50] Algorithm of optimal security hardening measures against insider threat [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1565 - 1577