ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Analytical Approach to Attack Graph Analysis for Network Security
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.21
◽
2010
◽
Cited By ~ 5
Author(s):
Phongphun Kijsanayothin
◽
Rattikorn Hewett
Keyword(s):
Network Security
◽
Analytical Approach
◽
Graph Analysis
◽
Attack Graph
Download Full-text
Related Documents
Cited By
References
A Heuristic Method of Attack Graph Analysis for Network Security Hardening
2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
◽
10.1109/cyberc.2014.18
◽
2014
◽
Cited By ~ 1
Author(s):
Zhao Chao
◽
Wang Huiqiang
◽
Guo Fangfang
◽
Zhou Mo
◽
Zhang Yushu
Keyword(s):
Network Security
◽
Heuristic Method
◽
Graph Analysis
◽
Attack Graph
◽
Security Hardening
Download Full-text
A Quantitative Method for Evaluating Network Security Based on Attack Graph
Network and System Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-64701-2_25
◽
2017
◽
pp. 349-358
◽
Cited By ~ 3
Author(s):
Yukun Zheng
◽
Kun Lv
◽
Changzhen Hu
Keyword(s):
Network Security
◽
Quantitative Method
◽
Attack Graph
Download Full-text
An attack graph based network security evaluation model for hierarchical network
2010 IEEE International Conference on Information Theory and Information Security
◽
10.1109/icitis.2010.5688764
◽
2010
◽
Cited By ~ 1
Author(s):
Haihui Ge
◽
Lize Gu
◽
Yixian Yang
◽
Kewei Liu
Keyword(s):
Network Security
◽
Evaluation Model
◽
Security Evaluation
◽
Hierarchical Network
◽
Attack Graph
Download Full-text
Dynamic Network Security Situation Prediction based on Bayesian Attack Graph and Big Data
2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC)
◽
10.1109/itoec.2018.8740765
◽
2018
◽
Cited By ~ 1
Author(s):
Pengwen Lin
◽
Yonghong Chen
Keyword(s):
Big Data
◽
Network Security
◽
Dynamic Network
◽
Attack Graph
Download Full-text
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis
Lecture Notes in Computer Science - Smart Grid Security
◽
10.1007/978-3-319-10329-7_3
◽
2014
◽
pp. 30-47
◽
Cited By ~ 2
Author(s):
Kristian Beckers
◽
Maritta Heisel
◽
Leanid Krautsevich
◽
Fabio Martinelli
◽
Rene Meis
◽
...
Keyword(s):
Smart Grid
◽
Graph Analysis
◽
Attack Tree
◽
Attack Graph
Download Full-text
Deployment optimization of IoT devices through attack graph analysis
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '19
◽
10.1145/3317549.3323411
◽
2019
◽
Cited By ~ 1
Author(s):
Noga Agmon
◽
Asaf Shabtai
◽
Rami Puzis
Keyword(s):
Graph Analysis
◽
Attack Graph
◽
Deployment Optimization
◽
Iot Devices
Download Full-text
Research on Attack Graph Generation for Network Security Situation
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013 - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-642-37502-6_134
◽
2013
◽
pp. 1147-1154
Author(s):
Yanbo Wang
◽
Huiqiang Wang
◽
Chao Zhao
◽
Yushu Zhang
◽
Ming Yu
Keyword(s):
Network Security
◽
Attack Graph
◽
Graph Generation
Download Full-text
Network Security Risk Assessment Based on Attack Graph
Journal of Computers
◽
10.4304/jcp.8.9.2339-2347
◽
2013
◽
Vol 8
(9)
◽
Cited By ~ 3
Author(s):
Lixia Xie
◽
Xiao Zhang
◽
Jiyong Zhang
Keyword(s):
Risk Assessment
◽
Network Security
◽
Security Risk
◽
Attack Graph
◽
Security Risk Assessment
Download Full-text
Analysis of attack graph-based metrics for quantification of network security
2012 Annual IEEE India Conference (INDICON)
◽
10.1109/indcon.2012.6420675
◽
2012
◽
Cited By ~ 5
Author(s):
Arkadeep Kundu
◽
Nirnay Ghosh
◽
Ishan Chokshi
◽
Soumya K Ghosh
Keyword(s):
Network Security
◽
Attack Graph
Download Full-text
An Attack Graph-Based Probabilistic Computing Approach of Network Security
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2010.01987
◽
2010
◽
Vol 33
(10)
◽
pp. 1987-1996
◽
Cited By ~ 9
Author(s):
Yun YE
◽
Xi-Shan XU
◽
Yan JIA
◽
Zhi-Chang QI
Keyword(s):
Network Security
◽
Attack Graph
◽
Computing Approach
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close