A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
暂无分享,去创建一个
Nizar Kheir | Nancy Perrot | Jean-Philippe Wary | M Yassine Naghmouchi | A Ridha Mahjoub | Jean-Philippe Wary | A. Mahjoub | Nizar Kheir | N. Perrot | M. Naghmouchi
[1] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[2] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[3] Elwood S. Buffa,et al. Graph Theory with Applications , 1977 .
[4] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .
[5] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[6] 백응기. [국외 광기술 연구ㆍ개발 현황] NIST(National Institute of Science and Technology) , 1999 .
[7] Atul Prakash,et al. Distilling critical attack graph surface iteratively through minimum-cost SAT solving , 2011, ACSAC '11.
[8] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[9] Wei Huang,et al. Toward optimal multi-objective models of network security: Survey , 2011, The 17th International Conference on Automation and Computing.