共 50 条
- [1] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
- [3] On the Use and Reuse of Graphs for Network Security with Real-Time Edge Learning [J]. PROCEEDINGS OF 2023 THE 12TH INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATION AND COMPUTING, ICNCC 2023, 2023, : 70 - 79
- [4] Real-time Risk Assessment Based on Hidden Markov Model and Security Configuration [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1599 - +
- [5] GENERALIZED NETWORK TOPOLOGY PROGRAM FOR REAL-TIME SECURITY ASSESSMENT [J]. IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1978, 97 (04): : 1012 - 1012
- [6] Security risk assessment based on bayesian multi-step attack graphs [J]. Journal of Computational Information Systems, 2015, 11 (11): : 3911 - 3918
- [7] Fast network attack modeling and security evaluation based on attack graphs [J]. 1600, River Publishers (03): : 27 - 46
- [9] Real-time Network Model Modification for Online Transient Security Assessment [J]. 2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
- [10] The Research of Security and Real-Time Based on the Control Information Network [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768