The optimized attribute attack graph based on APT attack stage model
暂无分享,去创建一个
[1] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[2] Jianhua Li,et al. Building network attack graph for alert causal correlation , 2008, Comput. Secur..
[3] Christoph Meinel,et al. A New Alert Correlation Algorithm Based on Attack Graph , 2011, CISIS.
[4] Joint Task Force Transformation Initiative,et al. Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .
[5] Won Hyung Park,et al. A study on cyber threat prediction based on intrusion detection event for APT attack detection , 2012, Multimedia Tools and Applications.
[6] Anthony Lai,et al. Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[7] Jianfang Li,et al. The study of APT attack stage model , 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS).
[8] Meng Yuan. A Backward Search Approach to Attack Graph Generation Based on Attack Patterns , 2011 .
[9] Yi Zhang,et al. Two Formal Analysis of Attack Graphs: Two Formal Analysis of Attack Graphs , 2010 .
[10] Anoop Singhal,et al. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .
[11] Yi Zhang,et al. A Scalable Approach to Analyzing Network Security using Compact Attack Graphs , 2010, J. Networks.
[12] Liu Lon. Complete Attack Graph Automatic Generation Method Based on Attack Pattern , 2013 .
[13] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.