Author:
Hong Jin B.,Kim Dong Seong
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference41 articles.
1. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs;Abadi;ISC Int. J. Inf. Secur.,2010
2. Ammann, P., Wijesekera, D., Kaushik, S., 2002. Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and communications security (CCS 2002). ACM, New York, NY, USA, pp. 217–224. http://dx.doi.org/10.1145/586110.586140.
3. Chen, B., Kalbarczyk, Z., Nicol, D., Sanders, W., Tan, R., Temple, W., Tippenhauer, N., Vu, A., Yau, D., 2013. Go with the flow: toward workflow-oriented security assessment. In: Proceedings of the 2013 Workshop on New Security Paradigms Workshop (NSPW 2013). ACM, New York, NY, USA, pp. 65–76. http://dx.doi.org/10.1145/2535813.2535821.
4. A Scalable approach to analyzing network security using compact attack graphs;Chen;J. Netw.,2010
5. Chu, M., Ingols, K., Lippmann, R., Webster, S., Boyer, S., 2010. Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. In: Proceedings of the 7th International Workshop on Visualization for Cyber Security (VizSec 2010). ACM, New York, NY, USA, pp. 22–33. http://dx.doi.org/10.1145/1850795.1850798.
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献