共 50 条
- [22] Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 398 - 402
- [23] An Attack Graph-based On-line Multi-step Attack Detector ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
- [24] A Key-Recovery Attack on 855-round Trivium ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 160 - 184
- [25] Key Recovery Attack Against 2.5-Round π-Cipher FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 535 - 553
- [26] Cascading Failure Model Considering Multi-Step Attack Strategy 2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
- [27] A Privacy-Preserving Multi-step Attack Correlation Algorithm PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1389 - 1393
- [28] Multi-Step Attack Pattern Detection on Normalized Event Logs 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 390 - 398
- [30] REDUCED MULTI-STEP ALGORITHMS FOR IDENTIFICATION OF LINEAR PLANTS PROBLEMS OF CONTROL AND INFORMATION THEORY-PROBLEMY UPRAVLENIYA I TEORII INFORMATSII, 1988, 17 (01): : 23 - 32