Review on the Application of Knowledge Graph in Cyber Security Assessment
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Implementing interactive analysis of attack graphs using relational databases , 2008, J. Comput. Secur..
[2] Adiel Aviad,et al. A Concept for Ontology-Based Value of Cybersecurity Knowledge , 2018 .
[3] Tian Zhihong,et al. Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model , 2010 .
[4] Li Aiping,et al. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory , 2011 .
[5] LiYang,et al. Knowledge Graph Construction Techniques , 2016 .
[6] G. Manimaran,et al. PENET: A practical method and tool for integrated modeling of security attacks and countermeasures , 2009, Comput. Secur..
[7] Wang Shuo,et al. Intelligent and Efficient Method for Optimal Penetration Path Generation , 2019 .
[8] Huiqun Yu,et al. Modeling and quantitatively predicting software security based on stochastic Petri nets , 2012, Math. Comput. Model..
[9] Igor Nai Fovino,et al. Integrating cyber attacks within fault trees , 2009, Reliab. Eng. Syst. Saf..
[10] Wang Shan,et al. A Survey on Ontology Learning Research , 2006 .
[11] Sushil Jajodia,et al. Interactive Analysis of Attack Graphs Using Relational Queries , 2006, DBSec.
[12] Steven Noel,et al. Chapter 4 – CyGraph: Graph-Based Analytics and Visualization for Cybersecurity , 2016 .
[13] Bassem Nasser,et al. A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies , 2005, Electron. Notes Theor. Comput. Sci..
[14] C. Vargas‐De‐León,et al. On the global stability of SIS, SIR and SIRS epidemic models with standard incidence , 2011 .
[15] Yan Jia,et al. A Practical Approach to Constructing a Knowledge Graph for Cybersecurity , 2018 .