共 50 条
- [32] Multics security evaluation: Vulnerability analysis 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 127 - 146
- [33] Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery 2020 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, ADVANCED MECHANICAL AND ELECTRICAL ENGINEERING (ICITAMEE 2020), 2020, : 265 - 269
- [35] Evaluation of Network Risk Using Attack Graph Based Security Metrics 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
- [38] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation APPLIED SCIENCES-BASEL, 2022, 12 (14):
- [40] A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2574 - 2583