Author:
Hong Jin B.,Kim Dong Seong
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 217–224. ACM, New York (2002)
2. Dewri, R., Poolsappasit, N., Ray, I., Whitley, D.: Optimal security hardening using multi-objective optimization on attack tree models of networks. In: Proc. of ACM Conference on Computer and Communications Security (CCS 2007), pp. 204–213. ACM, New York (2007)
3. Gupta, S., Winstead, J.: Using Attack Graphs to Design Systems. IEEE Security and Privacy 5(4), 80–83 (2007)
4. Xie, A., Cai, Z., Tang, C., Hu, J., Chen, Z.: Evaluating network security with two-layer attack graphs. In: Proc. of Computer Security Applications Conference, ACSAC 2009 (2009)
5. Ou, X., Boyer, W., McQueen, M.: A scalable approach to attack graph generation. In: Proc. of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 336–345. ACM (2006)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献