Publisher
Springer International Publishing
Reference42 articles.
1. Ammann, P.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 217–224. ACM Press (2002)
2. Awan, M.S.K., Burnap, P., Rana, O.: Identifying cyber risk hotspots: a framework for measuring temporal variance in computer network risk. Comput. Secur. 57, 31–46 (2016)
3. Braynov, S., Jadliwala, M.: Representation and analysis of coordinated attacks. In: Proceedings of the ACM Workshop on Formal Methods in Security Engineering, pp. 43–51. ACM (2003)
4. Bugtraq. http://www.securityfocus.com/archive/1
5. Chen, F., Liu, D., Zhang, Y., Su, J.: A scalable approach to analyzing network security using compact attack graphs. J. Netw. 5(5), 543–550 (2010)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Systematic Study for Understanding the Security Risks in 5G Core Network;2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS);2024-01-03
2. RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks;2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS);2023-01-03
3. Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface;2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS);2023-01-03