共 50 条
- [2] Risk Assessment Method of IoT Host Based on Attack Graph MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1504 - 1513
- [3] Host security assessment method based on attack graph Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
- [5] A Distributed network risk assessment method based on attack graph INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
- [6] Network Security Risk Assessment Method Based on HMM and Attack Graph Model 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
- [7] Risk Assessment and Diagnostic Method of Sulfate Attack of Cement-based Material ADVANCED BUILDING MATERIALS AND SUSTAINABLE ARCHITECTURE, PTS 1-4, 2012, 174-177 : 121 - +
- [8] A Risk Assessment Method of Network Host Node with Host Importance Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2022, 45 (02): : 16 - 21
- [9] A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
- [10] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118