共 50 条
- [31] Hierarchy-driven approach for attack patterns in software security education [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 1156 - +
- [32] Security Assessment of Computer Networks Based on Attack Graphs and Security Events [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471
- [34] Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation (Extended Abstract) [J]. ATTACKS AND DEFENSES FOR THE INTERNET OF THINGS, ADIOT, 2022, 13745 : 165 - 176
- [35] Attack Graph Based Security Metrics for Dynamic Networks [J]. INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 109 - 128
- [36] Attack scenario based approach to security test generation [J]. Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, 2011, 44 (04): : 344 - 352
- [37] Attack Pattern Mining Algorithm Based on Security Log [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 205 - 205
- [38] Strategic Defense and Attack in Deception based Network Security [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161
- [39] An attack graph-based probabilistic security metric [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
- [40] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347