Author:
Barik Mridul Sankar,Mazumdar Chandan
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Chen, B., Yegneswaran, V., Barford, P., Ramakrishnan, R.: Toward a Query Language for Network Attack Data. In: Proceedings of the 22nd International Conference on Data Engineering Workshops, pp. 28–28. IEEE Press, New York (2006)
2. Lecture Notes in Computer Science;F. Chen,2009
3. Idika, N., Bhargava, B.: Extending Attack Graph-Based Security Metrics and Aggregating Their Application. IEEE Transaction on Dependable and Secure Computing 9(1), 75–85 (2012)
4. Jajodia, S., Noel, S., O’Berry, B.: Topological Analysis of Network Attack Vul-nerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats. LNCS, pp. 247–266. Springer (2005)
5. Joslyn, C., Choudhury, S., Haglin, D., Howe, B., Nickless, B., Olsen, B.: Massive scale cyber traffic analysis: a driver for graph database research. In: First International Workshop on Graph Data Management Experiences and Systems, pp. 3:1–3:6. ACM, New York (2013)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献