Author:
Yin Ziqi,Li Shudong,Han Weihong,Wu Xiaobo,Li Shumei
Publisher
Springer Nature Singapore
Reference10 articles.
1. Ingols, K., Chu, M., Lippmann, R., et al.: Modeling modern network attacks and countermeasures using attack graphs. In: 2009 Annual Computer Security Applications Conference, pp. 117–126. IEEE (2009).
2. Ou, X, Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 336–345 (2006)
3. Lippmann, R., Ingols, K., Scott, C., et al.: Validating and restoring defense in depth using attack graphs. In: MILCOM 2006–2006 IEEE Military Communications Conference, pp. 1–10. IEEE (2006)
4. Ye, Z., Guo, Y., Li, T., et al.: An extended attack graph generation method based on knowledge graph. Comput. Sci. 46, 165–173 (2019)
5. Yang, H., Zeng, R., Xu, G., et al.: A network security situation assessment method based on adversarial deep learning. Appl. Soft Comput. 102(8), 107096 (2021)