Network Security Risk Assessment Based on Attack Graph
暂无分享,去创建一个
[1] Wanli Zuo,et al. Optimizing Large Query by Simulated Annealing Algorithm Based On Graph-Based Approach , 2011, J. Softw..
[2] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[3] C. R. Ramakrishnan,et al. Model-Based Vulnerability Analysis of Computer Systems , 1998 .
[4] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Jeannette M. Wing,et al. Scenario graphs and attack graphs , 2004 .
[6] Zhibin Liu,et al. Evaluating the Network and Information System Security Based on SVM Model , 2009, J. Comput..
[7] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[8] Paul Ammann,et al. A host-based approach to network attack chaining analysis , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[9] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[10] Qingtao Wu,et al. Evaluation of Network Connection Credibility based on Neural Network , 2011, J. Comput..
[11] Zhang Yong. Research on Network Node Correlation in Network Risk Assessment , 2007 .