共 50 条
- [22] Network security analysis model based on the increase in attack ability [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (12): : 2012 - 2019
- [23] Analysis of computer network attack based on the virus propagation model [J]. EURASIP Journal on Wireless Communications and Networking, 2020
- [24] Complex Network Security Analysis based on Attack Graph Model [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
- [25] GLOBAL STABILITY ANALYSIS OF A VEISV MODEL FOR NETWORK WORM ATTACK [J]. UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN-SERIES A-APPLIED MATHEMATICS AND PHYSICS, 2017, 79 (04): : 179 - 188
- [26] An Empirical Study of Network Forensics Analysis Tools [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 366 - 370
- [27] Understanding Network Forensics Analysis in an Operational Environment [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118
- [28] Building evidence graphs for network forensics analysis [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 229 - 239
- [29] Method Ontology for Intelligent Network Forensics Analysis [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 7 - 14
- [30] Network Security Approach for Digital Forensics Analysis [J]. ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267