Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference
暂无分享,去创建一个
[1] 송왕철,et al. IDS(Intrusion Detection System) , 2000 .
[2] Sushil Jajodia,et al. Advanced Vulnerability Analysis and Intrusion Detection through Predictive Attack Graphs , 2009 .
[3] John S. Heidemann,et al. Understanding passive and active service discovery , 2007, IMC '07.
[4] Richard Lippmann,et al. Experience Using Active and Passive Mapping for Network Situational Awareness , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[5] James B Kuntzelman. Comparative Analysis of Active and Passive Mapping Techniques in an Internet-Based Local Area Network , 2012 .
[6] Hervé Debar,et al. Improving security management through passive network observation , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[7] Sushil Jajodia,et al. Topological Vulnerability Analysis , 2010, Cyber Situational Awareness.