Funder
National Key Research and Development Program of China
National Social Science Fund of China
Ministry of Education of China
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference49 articles.
1. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends;Zafar;Comput. Secur.,2017
2. Combating advanced persistent threats: From network event correlation to incident detection;Friedberg;Comput. Secur.,2015
3. Network virtualization and software defined networking for cloud computing: a survey;Jain;IEEE Commun. Mag.,2013
4. Measuring network security using dynamic bayesian network;Frigault,2008
5. A. Singhal, X. Ou, Security Risk Analysis Of Enterprise Networks Using Probabilistic Attack Graphs, National Institute of Science and Technology Interagency Report 7788, Gaithersburg, MD, 2011.
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dynamic Real-Time Analysis of Network Attacks Based on Dynamic Risk Probability Algorithm;Journal of Advanced Computational Intelligence and Intelligent Informatics;2024-01-20
2. An APT Attack Detection Method of a New-type Power System Based on
STSA-transformer;Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering);2024-01
3. A Federated Learning-Based Approach for Predicting Cross-Domain Network Attack Behavior;Lecture Notes in Electrical Engineering;2024
4. Research on Multi-stage Proactive Defense Strategy against Intelligent Penetration Attacks;2023 IEEE 6th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE);2023-12-15
5. Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection;2023 IEEE Conference on Communications and Network Security (CNS);2023-10-02