共 50 条
- [21] A Heuristic Method of Attack Graph Analysis for Network Security Hardening [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
- [22] Visualization of security event logs across multiple networks and its application to a CSOC [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1861 - 1872
- [23] A Graph-Based Approach for Analysis of Software Security [J]. RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 68 - 79
- [24] Taming the logs - Vocabularies for semantic security analysis [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON SEMANTIC SYSTEMS, 2018, 137 : 109 - 119
- [25] Visualization of security event logs across multiple networks and its application to a CSOC [J]. Cluster Computing, 2019, 22 : 1861 - 1872
- [26] Language-based Security Analysis of Database Applications [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT), 2015,
- [27] A Graph Based Security Description Method of Driving Behavior Characteristics [J]. CICTP 2020: TRANSPORTATION EVOLUTION IMPACTING FUTURE MOBILITY, 2020, : 4254 - 4265
- [28] A Quantitative Method for Evaluating Network Security Based on Attack Graph [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
- [29] HUGE GRAPH VISUALIZATION AND ANALYSIS [J]. BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2014, 30 (04): : 7 - 16
- [30] Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis [J]. 2020 INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT AND BIOENGINEERING (ICEEB 2020), 2020, 185