共 50 条
- [22] ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 92 - +
- [23] A scalable representation towards attack graph generation [J]. PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152
- [24] Overview on Attack Graph Generation and Visualization Technology [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
- [25] A Workflow for Distributed and Resilient Attack Graph Generation [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 185 - 187
- [27] Network Vulnerability Assessment based on Attack Graph [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
- [28] Attack graph based evaluation of network security [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
- [29] An Attack Path Generation Methods Based on Graph Database [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1905 - 1910
- [30] Attack Graph Generation, Visualization and Analysis: Issues and Challenges [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 379 - 390