共 50 条
- [21] Applying Attack Graphs to Network Security Metric MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
- [22] A Method for Analyzing EPC Entity Security Threats by Using Attack Graphs PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 981 - 984
- [23] An Automated Framework for Generating Attack Graphs Using Known Security Threats 2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
- [24] Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs 2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 3415 - 3421
- [25] Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 304 - 311
- [26] Identification of Attack Paths Using Kill Chain and Attack Graphs PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
- [27] Poster: CrystalBall - Attack Graphs Using Large Language Models and RAGs 2024 IEEE 44TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS 2024, 2024, : 1450 - 1451
- [28] Optimal Security Hardening over a Probabilistic Attack Graph SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 21 - 30
- [29] An attack graph-based probabilistic security metric DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
- [30] GENERATING NETWORK ATTACK GRAPHS FOR SECURITY ALERT CORRELATION 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 220 - 225