Author:
Hu Hao,Liu Jing,Zhang Yuchen,Liu Yuling,Xu Xiaoyu,Tan Jinglei
Funder
National Key Research and Development Program of China Stem Cell and Translational Research
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference29 articles.
1. Survey of attack projection, prediction, and forecasting in cyber security;Husák;IEEE Commun Surv Tutor,2018
2. Vulnerability life cycle oriented security risk metric method;Hu;J Softw,2018
3. Real-time multistep attack prediction based on Hidden Markov Models;Holgado;IEEE Trans Dependable Secur Comput,2017
4. Taxonomy and survey of collaborative intrusion detection;Vasilomanolakis;ACM Comput Surv,2015
5. Attack scenario reconstruction using intrusion semantics;Barzegar;Expert Syst Appl,2018
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献