共 50 条
- [22] Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1920 - 1937
- [23] Minimum-cost network hardening using attack graphs [J]. COMPUTER COMMUNICATIONS, 2006, 29 (18) : 3812 - 3824
- [25] A Graph Model of the Topology of Physical, Link and Network Layers of an Enterprise Network [J]. PROCEEDINGS OF THE 19TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2016, : 3 - 9
- [27] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
- [29] Automatic Construction and Optimization of Layered Network Attack Graph [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 135 - 138
- [30] Attack Graph Generation and Visualization for Industrial Control Network [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660