Finding the minimum cut set in attack graphs using genetic algorithms
暂无分享,去创建一个
M. Alhomidi | M. Reed | M. Reed | M. Alhomidi
[1] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[2] Lingyu Wang,et al. A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph , 2008, 2008 New Technologies, Mobility and Security.
[3] Ravindra K. Ahuja,et al. Network Flows: Theory, Algorithms, and Applications , 1993 .
[4] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[5] Xinming Ou,et al. Identifying Critical Attack Assets in Dependency Attack Graphs , 2008, ESORICS.
[6] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[7] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[8] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[9] Soumya K. Ghosh,et al. A planner-based approach to generate and analyze minimal attack graph , 2010, Applied Intelligence.