共 50 条
- [1] A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement [J]. WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 2144 - 2154
- [2] Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 53 - 61
- [3] Network Vulnerability Assessment based on Attack Graph [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
- [4] Novel Method of Assessing Network Security Risks Based on Vulnerability Correlation Graph [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1085 - 1090
- [5] Attack graph based evaluation of network security [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
- [8] Evaluation of Network Risk Using Attack Graph Based Security Metrics [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
- [9] Network Security Risk Assessment System Based on Attack Graph and Markov Chain [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
- [10] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347