共 50 条
- [31] Strategies for Practical Hybrid Attack Graph Generation and Analysis [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):
- [32] A Generation Method of Attack Graph Based on Evolutionary Computation [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
- [33] Identifying Interdependencies Using Attack Graph Generation Methods [J]. 2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 80 - 85
- [34] An Attack Graph Generation Method Based on Parallel Computing [J]. SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
- [35] Multimodal graph inference network for scene graph generation [J]. Applied Intelligence, 2021, 51 : 8768 - 8783
- [36] Multimodal graph inference network for scene graph generation [J]. APPLIED INTELLIGENCE, 2021, 51 (12) : 8768 - 8783
- [37] Exploiting Domination in Attack Graph for Enterprise Network Hardening [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 342 - 353
- [38] A Survey of Network Attack Investigation Based on Provenance Graph [J]. Tian, Zhi-Hong (tianzhihong@gzhu.edu.cn), 1600, Chinese Institute of Electronics (52):
- [39] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
- [40] Label flipping adversarial attack on graph neural network [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 65 - 74