共 50 条
- [2] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks [J]. Telecommunication Systems, 2024, 85 : 601 - 621
- [3] Network Vulnerability Analysis Using a Constrained Graph Data Model [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 263 - 282
- [4] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317
- [5] Using vulnerability analysis to model attack scenario for collaborative intrusion detection [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1273 - 1277
- [7] AGQL: A Query Language for Attack Graph based Network Vulnerability Analysis [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
- [8] IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in aWeighted Attack Graph [J]. PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 315 - 326
- [9] Network Vulnerability Assessment based on Attack Graph [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
- [10] An Intelligent Model for Vulnerability Analysis of Social Media User [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 258 - 263