共 50 条
- [1] Random Graph Based Benchmarking Methodology for RFID Security Protocols [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 184 - 191
- [2] Research on attack model and security mechanism of RFID system [J]. ADVANCES IN ENERGY, ENVIRONMENT AND MATERIALS SCIENCE, 2016, : 819 - 822
- [3] Network Security Risk Assessment Method Based on HMM and Attack Graph Model [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
- [4] Network Security Risk Assessment System Based on Attack Graph and Markov Chain [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
- [5] Attack Graph-Based Quantitative Assessment for Industrial Control System Security [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 1748 - 1753
- [6] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
- [7] Host security assessment method based on attack graph [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
- [9] Network Security Situation Assessment Methods and Tactics Based on Multivariate Spatiotemporal Attack Graph Model [J]. 20TH INT CONF ON UBIQUITOUS COMP AND COMMUNICAT (IUCC) / 20TH INT CONF ON COMP AND INFORMATION TECHNOLOGY (CIT) / 4TH INT CONF ON DATA SCIENCE AND COMPUTATIONAL INTELLIGENCE (DSCI) / 11TH INT CONF ON SMART COMPUTING, NETWORKING, AND SERV (SMARTCNS), 2021, : 541 - 548
- [10] Study of network security evaluation based on attack graph model [J]. Tongxin Xuebao, 2007, 3 (29-34):