共 50 条
- [1] Ransomware behavior attack construction via graph theory approach [J]. International Journal of Advanced Computer Science and Applications, 2020, (02): : 487 - 496
- [4] RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph [J]. SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 252 - 267
- [5] A Novel Approach for Attack Tree to Attack Graph Transformation [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 74 - 90
- [6] Graph Adversarial Attack via Rewiring [J]. KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1161 - 1169
- [7] A Novel Approach for Analysis of Attack Graph [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 7 - 12
- [8] A Reinforcementearning Approach for Attack Graph Analysis [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 212 - 217
- [9] Detecting falsified timestamps in evidence graph via attack graph [J]. 2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 369 - 374
- [10] An Integrated Network Scanning Tool for Attack Graph Construction [J]. ADVANCES IN GRID AND PERVASIVE COMPUTING, 2011, 6646 : 138 - 147