共 50 条
- [21] Measuring the overall security of network configurations using attack graphs [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 98 - +
- [22] Evaluating Network Security With Two-layer Attack Graphs [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 127 - +
- [23] A Multi-Objective Approach for Security Hardening and Probabilistic Vulnerability Assessment on Attack Graphs [J]. 2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 726 - 735
- [24] A Network Security Situation Assessment Method Based On Attack Intention Perception [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1138 - 1142
- [26] Network Security Situation Evaluation Method Based on Attack Intention Recognition [J]. PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 919 - 924
- [27] Research on attack graph generation for network security situation [J]. Adv. Intell. Sys. Comput., (1147-1154):
- [29] An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 209 - +
- [30] Security Assessment of Computer Networks Based on Attack Graphs and Security Events [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471