Active Cyber Attack Model for Network System's Vulnerability Assessment
暂无分享,去创建一个
[1] Nong Ye,et al. A process control approach to cyber attack detection , 2001, Commun. ACM.
[2] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[3] Haeng-Kon Kim. Intelligent Retrieval Agent based on Distributed Environment , 2006, Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06).
[4] Carlos Sarraute,et al. Building Computer Network Attacks , 2010, ArXiv.
[5] T. Tidwell,et al. Modeling Internet Attacks , 2022 .
[6] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[7] Igor Kotenko. AGENT-BASED MODELING AND SIMULATION OF CYBERWARFARE BETWEEN MALEFACTORS AND SECURITY AGENTS IN INTERNET , 2005 .
[8] Jerald Dawkins,et al. A structural framework for modeling multi-stage network attacks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[9] Somesh Jha,et al. Minimization and Reliability Analyses of Attack Graphs , 2002 .
[10] Richard E. Overill. Information warfare: battles in cyberspace , 2001 .