共 50 条
- [1] A Heuristic Method of Attack Graph Analysis for Network Security Hardening [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
- [3] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774
- [4] A Method Based on Global Attack Graph for Network Hardening [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
- [5] Applying Attack Graphs to Network Security Metric [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
- [6] Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps [J]. INTELLIGENT DECISION TECHNOLOGIES (IDT'2012), VOL 2, 2012, 16 : 433 - 440
- [7] Minimum-cost network hardening using attack graphs [J]. COMPUTER COMMUNICATIONS, 2006, 29 (18) : 3812 - 3824
- [8] Generation method of power network security defense strategy based on Markov decision process [J]. Distributed Generation and Alternative Energy Journal, 2021, 36 (03):
- [9] PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2024, 2024, : 254 - 264
- [10] GENERATING NETWORK ATTACK GRAPHS FOR SECURITY ALERT CORRELATION [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 220 - 225