共 50 条
- [31] Generation of Colon Tissue Graph for Identifying Deformed Images 2014 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS: MAGNETICS, MACHINES AND DRIVES (AICERA/ICMMD), 2014,
- [32] AI planning-based approach of attack graph generation Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (05): : 460 - 465
- [33] Design Procedure of Knowledge Base for Practical Attack Graph Generation PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 594 - 601
- [34] Research on Automatic Generation and Analysis Technology of Network Attack Graph 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 133 - 139
- [35] An atomic-domains-based approach for attack graph generation World Academy of Science, Engineering and Technology, 2009, 32 : 775 - 781
- [37] Attack Graph Generation Method Based on Privilege Escalation Matrix Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (01): : 101 - 105
- [38] An Attack Graph Generation Method Based on Heuristic Searching Strategy 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1180 - 1185
- [40] SCADA Attack Modeling Using Bond Graph 2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 2019,