共 50 条
- [31] An approach to evaluate network security risk based on attack graph [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
- [32] Study of network security evaluation based on attack graph model [J]. Tongxin Xuebao, 2007, 3 (29-34):
- [33] Complex Network Security Analysis based on Attack Graph Model [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
- [34] State Grid Network Attack-defense Graph Generation Method [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398
- [35] Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 324 - 344
- [38] A Review on Network Attack Graph Technology [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 239 - 245
- [39] Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 1 - 17
- [40] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317