Author:
Conti Vincenzo,Ruffo Simone Sante,Merlo Alessio,Migliardi Mauro,Vitabile Salvatore
Publisher
Springer International Publishing
Reference25 articles.
1. Common Vulnerability Scoring System Version 3.0 Calculator (2017). https://www.first.org/cvss/calculator/3.0
2. Baddar, S.A.H., Merlo, A., Migliardi, M.: Anomaly detection in computer networks: a state-of-the-art review. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 5(4), 29–64 (2014)
3. Brin, S., Page, L.: The anatomy of a large-scale hypertextual web searchengine. Comput. Netw. ISDN Syst. 30(1), 107–117 (1998). https://doi.org/10.1016/S0169-7552(98)00110-X . Proceedings of the Seventh International World Wide Web Conference
4. Chokshi, I., Das, S., Ghosh, N., Ghosh, S., Kaushik, A., Sarkar, M.: NetSecuritas: an integrated attack graph-based security assessment tool for enterprise network. In: Proceedings of the 2015 International Conference on Distributed Computing and Networking (2015)
5. Conti, V., Ruffo, S., Vitabile, S., Barolli, L.: BIAM: a new bio-inspired analysis methodology for digital ecosystems based on a scale-free architecture. Soft Comput. 1–18 (2017)