共 50 条
- [31] Performance impact of connectivity restrictions and increased vulnerability presence on automated attack graph generation ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 33 - 46
- [32] AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (05): : 5178 - 5196
- [33] A quantifiable Attack-Defense Trees model for APT attack PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2303 - 2306
- [35] A Proof Calculus for Attack Trees in Isabelle DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 3 - 18
- [36] Simple Infeasibility Certificates for Attack Trees ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 39 - 55
- [37] Automated Attack Surface Approximation 2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 1063 - 1065
- [38] Learning Attack Trees by Genetic Algorithms THEORETICAL ASPECTS OF COMPUTING, ICTAC 2023, 2023, 14446 : 55 - 73
- [39] Automated Simple Analysis Attack 2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 214 - 217
- [40] Attack Defense Trees with Sequential Conjunction 201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 247 - 252