共 50 条
- [1] A Heuristic Method of Attack Graph Analysis for Network Security Hardening [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
- [2] Exploiting Domination in Attack Graph for Enterprise Network Hardening [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 342 - 353
- [3] A method for global attack graph generation [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 236 - +
- [4] Optimal Network Security Hardening Using Attack Graph Games [J]. PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 526 - 532
- [6] A Quantitative Method for Evaluating Network Security Based on Attack Graph [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
- [7] A Distributed network risk assessment method based on attack graph [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
- [8] Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 122 - 135
- [10] IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in aWeighted Attack Graph [J]. PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 315 - 326