Author:
Wu Songyang,Zhang Yong,Cao Wei
Funder
National Natural Science Foundation of China
Subject
Electrical and Electronic Engineering,General Computer Science,Control and Systems Engineering
Reference24 articles.
1. Security optimization of dynamic networks with probabilistic graph modeling and linear programming;Almohri;IEEE Trans Dependable Secure Comput,2016
2. A scalable approach to attack graph generation;Ou,2006
3. Topological analysis of network attack vulnerability;Jajodia,2005
4. Mulval: a logic-based network security analyzer;Ou,2005
5. Dynamic security risk management using bayesian attack graphs;Poolsappasit;IEEE Trans Dependable Secure Comput,2012
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献