共 50 条
- [41] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
- [42] RFID System Security Assessment Methodology Based on Attack Graph Model [J]. PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1161 - 1166
- [43] Analysis of Complex Networks for Security Issues using Attack Graph [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
- [44] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
- [45] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation [J]. APPLIED SCIENCES-BASEL, 2022, 12 (14):
- [47] A Distributed network risk assessment method based on attack graph [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
- [48] A systematic approach to network security assessment [J]. COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2004, : 79 - 84
- [49] Using network attack graph to predict the future attacks [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 940 - 944