共 50 条
- [1] Generation and Risk Analysis of Network Attack Graph [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
- [2] Research on attack graph generation for network security situation [J]. Adv. Intell. Sys. Comput., (1147-1154):
- [4] A Review on Network Attack Graph Technology [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 239 - 245
- [5] Overview on Attack Graph Generation and Visualization Technology [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
- [6] Naggen: a Network Attack Graph GENeration Tool [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
- [7] Practical attack graph generation for network defense [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
- [8] Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 122 - 135
- [9] Automatic Construction and Optimization of Layered Network Attack Graph [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 135 - 138
- [10] Attack Graph Generation and Analysis Techniques [J]. DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567