共 50 条
- [22] A survivability quantitative analysis model for network system based on attack graph [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3211 - 3216
- [23] Network intrusion intention analysis model based on Bayesian attack graph [J]. 1600, Editorial Board of Journal on Communications (41): : 160 - 169
- [24] An intelligent model for mitigating the attack effects [J]. ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 165 - 168
- [26] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation [J]. APPLIED SCIENCES-BASEL, 2022, 12 (14):
- [27] Vulnerability association evaluation of Internet of thing devices based on attack graph [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (05):
- [28] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
- [30] Research on SQL Injection Vulnerability Attack model [J]. PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 217 - 221