Author:
Yang Mingsheng,Yang Jie,Han Weihong,Zhang Jiawei
Publisher
Springer Nature Singapore
Reference20 articles.
1. Cunningham, William H.: Optimal attack and reinforcement of a network. J. ACM 32(3), 549–561 (1985). https://doi.org/10.1145/3828.3829
2. Lallie, H.S., Debattista, K., Bal, J.: A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 35, 100219 (2020)
3. Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: A logic-based network security analyzer. In 14th USENIX Security Symposium, Baltimore, MD, USA (2005)
4. Kuang, R.B.: Rule Based Security Checking. Technical Report, MIT Lab for Computer Science (1994)
5. Swiler, L.P., Phillips, C., Gaylor, T.: A Graph Based Network Vulnerability Analysis System, SAND97-3010/1. Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, 1998