共 50 条
- [41] ACCURIFY: Automated New Testflows Generation for Attack Variants in Threat Hunting FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : 52 - 69
- [42] Ranking Attack Graphs RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 127 - 144
- [43] Efficient Attack Plan Recognition using Automated Planning 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 1001 - 1006
- [44] DOS attack using automated vulnerability scanning software Education Training and Information Communication Technologies RoEduNet' 05: Proceedings of the 4th International Conference RoEduNet Romania, 2005, : 261 - 267
- [45] Automated software attack recovery using rollback and huddle Design Automation for Embedded Systems, 2008, 12 : 243 - 260
- [47] Automated Generation and Simulation of Component-Based Generalized Bond Graphs PROCEEDINGS OF THE 2012 10TH INTERNATIONAL CONFERENCE ON BOND GRAPH MODELING AND SIMULATION (ICBGM'12), 2012, 44 (13): : 31 - 40
- [48] A Flexible Approach to Measuring Network Security Using Attack Graphs PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 426 - 431
- [49] SecKG: Leveraging attack detection and prediction using knowledge graphs 2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 112 - 119
- [50] Crown Jewels Analysis using Reinforcement Learning with Attack Graphs 2021 IEEE Symposium Series on Computational Intelligence, SSCI 2021 - Proceedings, 2021,