Application of graph theory in threat situation analysis of network security

被引:0
|
作者
Telecommunication Engineering Institute, Air Force Engineering University, Xi'an 710077, China [1 ]
机构
来源
Beijing Youdian Daxue Xuebao | 2009年 / 1卷 / 113-117期
关键词
Graph theory - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis
    Cai, Xiangdong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 383 - 388
  • [2] Application of Primary Components Analysis of Security Threat in Wireless Network
    Qu Zhiming
    Wang Jingmei
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 234 - +
  • [3] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [4] Network Security Situation Awareness Based on Intercepting the Threat Spread
    Zhou, Bo
    Zhong, Lin-fei
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 876 - 879
  • [5] Network Security Situation Awareness Framework based on Threat Intelligence
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (03): : 381 - 399
  • [6] Method of Network Security Situation Analysis
    Jin Jin
    Song Jian
    Tian Changhui
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 160 - 163
  • [7] APPLICATION OF FRACTAL NEURAL NETWORK IN NETWORK SECURITY SITUATION AWARENESS
    Ding, Caichang
    Chen, Yiqin
    Algarni, Abdullah M.
    Zhang, Guojun
    Peng, Honghui
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2022, 30 (02)
  • [8] Application of cloud models in network security situation assessment
    Guo, YB
    Ma, JF
    Wang, YD
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 8570 - 8573
  • [9] Network Security Situation Prediction Technology Based on Fusion of Knowledge Graph
    Luo, Wei
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 881 - 891
  • [10] Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
    Yu, Yang
    Wang, Jian
    Liu, Jiqiang
    Han, Lei
    He, Xudong
    Lv, Shaohua
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,