Funder
Tokyo Institute of Technology
Subject
Law,General Computer Science
Reference95 articles.
1. Automated generation of attack graphs using NVD;Aksu,2018
2. Time-efficient and cost-effective network hardening using attack graphs;Albanese,2012
3. Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks;Ali;Appl. Soft Comput.,2013
4. Security optimization of dynamic networks with probabilistic graph modeling and linear programming;Almohri;IEEE Trans. Dependable Secure Comput.,2016
5. A host-based approach to network attack chaining analysis;Ammann,2005
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献