Depth-first method for attack graph generation

被引:0
|
作者
Information Security Research Center, Harbin Engineering University, Harbin 150001, China [1 ]
不详 [2 ]
机构
来源
Jilin Daxue Xuebao (Gongxueban) | 2009年 / 2卷 / 446-452期
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A Generation Method of Attack Graph Based on Evolutionary Computation
    Wang, Jiajia
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
  • [42] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [43] A multiconstraint QoS routing scheme using the depth-first search method with limited crankbacks
    Shin, D
    Chong, EKP
    Siegel, HJ
    2001 IEEE WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2001, : 385 - 389
  • [44] Depth-first search in directed planar graphs, revisited
    Allender, Eric
    Chauhan, Archit
    Datta, Samir
    ACTA INFORMATICA, 2022, 59 (04) : 289 - 319
  • [46] A depth-first algorithm to reduce graphs in linear time
    Bartha, Miklos
    Kresz, Miklos
    11TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2009), 2009, : 273 - 281
  • [47] Depth-first search for solving job scheduling problem
    Zhang, Xuanping
    Hang, Shengce
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering & Electronics, 1998, 20 (08): : 19 - 22
  • [48] Duplicate Avoidance in Depth-First Search with Applications to Treewidth
    Dow, P. Alex
    Korf, Richard E.
    21ST INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-09), PROCEEDINGS, 2009, : 480 - 485
  • [49] Depth-First Non-Derivable Itemset Mining
    Calders, Toon
    Goethals, Bart
    PROCEEDINGS OF THE FIFTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING, 2005, : 250 - 261
  • [50] An exact depth-first algorithm for the pellet loading problem
    Bhattacharya, S
    Roy, R
    Bhattacharya, S
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 1998, 110 (03) : 610 - 625