共 50 条
- [1] An Approach for Security Assessment of Network Configurations using Attack Graph [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 283 - 288
- [2] An approach to evaluate network security risk based on attack graph [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
- [3] Complex Network Security Analysis based on Attack Graph Model [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
- [4] A Heuristic Method of Attack Graph Analysis for Network Security Hardening [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
- [5] Analysis of Attack Graph-based Metrics for Quantification of Network Security [J]. 2012 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2012, : 530 - 535
- [6] Attack graph based evaluation of network security [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
- [7] NETWORK SECURITY ANALYSIS BASED ON HOST-BASED ATTACK GRAPH [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 88 - +
- [8] Network Security Risk Assessment Based on Attack Graph [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
- [9] Heuristic Network Security Risk Based on Attack Graph [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194