共 50 条
- [31] ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 92 - +
- [32] A scalable representation towards attack graph generation [J]. PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152
- [33] Overview on Attack Graph Generation and Visualization Technology [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
- [34] A Workflow for Distributed and Resilient Attack Graph Generation [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 185 - 187
- [35] Research on Network Defense Graph Model in Network Security [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 23 - 32
- [36] Adversarial organization modeling for network attack/defense [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 90 - 99
- [37] Common Network Attack Types and Defense Mechanisms [J]. 2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2658 - 2661
- [38] Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 3961 - 3967
- [39] Adversarial Examples for Graph Data: Deep Insights into Attack and Defense [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4816 - 4823