共 50 条
- [21] A Survey of Network Attack Investigation Based on Provenance Graph Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (07): : 2529 - 2556
- [23] Heuristic Network Security Risk Based on Attack Graph CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
- [24] Network Attack Identification and Analysis Based on Graph Convolutional Neural Network 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1443 - 1448
- [25] Optimal Security Hardening over a Probabilistic Attack Graph SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 21 - 30
- [26] Research on Key Node Method of Network Attack Graph Based on Power Information Physical System PROCEEDINGS OF 2021 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2021), 2021, : 48 - 51
- [27] A Generation Method of Attack Graph Based on Evolutionary Computation PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
- [28] Method of Cyber Attack Attribution Based on Graph Model Ruan Jian Xue Bao/Journal of Software, 2022, 33 (02): : 683 - 698
- [29] An Attack Graph Generation Method Based on Parallel Computing SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
- [30] Host security assessment method based on attack graph Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99