ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Heuristic Method of Attack Graph Analysis for Network Security Hardening
2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
◽
10.1109/cyberc.2014.18
◽
2014
◽
Cited By ~ 1
Author(s):
Zhao Chao
◽
Wang Huiqiang
◽
Guo Fangfang
◽
Zhou Mo
◽
Zhang Yushu
Keyword(s):
Network Security
◽
Heuristic Method
◽
Graph Analysis
◽
Attack Graph
◽
Security Hardening
Download Full-text
Related Documents
Cited By
References
Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph
Communications in Computer and Information Science - Security in Computing and Communications
◽
10.1007/978-981-10-6898-0_1
◽
2017
◽
pp. 1-15
Author(s):
M. A. Jabbar
◽
Ghanshyam S. Bopche
◽
B. L. Deekshatulu
◽
B. M. Mehtre
Keyword(s):
Network Security
◽
Cost Effective
◽
Attack Graph
◽
Security Hardening
◽
Effective Network
Download Full-text
Analytical Approach to Attack Graph Analysis for Network Security
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.21
◽
2010
◽
Cited By ~ 5
Author(s):
Phongphun Kijsanayothin
◽
Rattikorn Hewett
Keyword(s):
Network Security
◽
Analytical Approach
◽
Graph Analysis
◽
Attack Graph
Download Full-text
A Quantitative Method for Evaluating Network Security Based on Attack Graph
Network and System Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-64701-2_25
◽
2017
◽
pp. 349-358
◽
Cited By ~ 3
Author(s):
Yukun Zheng
◽
Kun Lv
◽
Changzhen Hu
Keyword(s):
Network Security
◽
Quantitative Method
◽
Attack Graph
Download Full-text
An attack graph based network security evaluation model for hierarchical network
2010 IEEE International Conference on Information Theory and Information Security
◽
10.1109/icitis.2010.5688764
◽
2010
◽
Cited By ~ 1
Author(s):
Haihui Ge
◽
Lize Gu
◽
Yixian Yang
◽
Kewei Liu
Keyword(s):
Network Security
◽
Evaluation Model
◽
Security Evaluation
◽
Hierarchical Network
◽
Attack Graph
Download Full-text
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
2020 IEEE Symposium on Computers and Communications (ISCC)
◽
10.1109/iscc50000.2020.9219722
◽
2020
◽
Author(s):
Hangsheng Zhang
◽
Haitao Liu
◽
Jie Liang
◽
Ting Li
◽
Liru Geng
◽
...
Keyword(s):
Network Security
◽
Advanced Persistent Threats
◽
Multi Stage
◽
Security Hardening
◽
Optimal Network
◽
Network Game
Download Full-text
Dynamic Network Security Situation Prediction based on Bayesian Attack Graph and Big Data
2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC)
◽
10.1109/itoec.2018.8740765
◽
2018
◽
Cited By ~ 1
Author(s):
Pengwen Lin
◽
Yonghong Chen
Keyword(s):
Big Data
◽
Network Security
◽
Dynamic Network
◽
Attack Graph
Download Full-text
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis
Lecture Notes in Computer Science - Smart Grid Security
◽
10.1007/978-3-319-10329-7_3
◽
2014
◽
pp. 30-47
◽
Cited By ~ 2
Author(s):
Kristian Beckers
◽
Maritta Heisel
◽
Leanid Krautsevich
◽
Fabio Martinelli
◽
Rene Meis
◽
...
Keyword(s):
Smart Grid
◽
Graph Analysis
◽
Attack Tree
◽
Attack Graph
Download Full-text
Deployment optimization of IoT devices through attack graph analysis
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '19
◽
10.1145/3317549.3323411
◽
2019
◽
Cited By ~ 1
Author(s):
Noga Agmon
◽
Asaf Shabtai
◽
Rami Puzis
Keyword(s):
Graph Analysis
◽
Attack Graph
◽
Deployment Optimization
◽
Iot Devices
Download Full-text
Research on Attack Graph Generation for Network Security Situation
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013 - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-642-37502-6_134
◽
2013
◽
pp. 1147-1154
Author(s):
Yanbo Wang
◽
Huiqiang Wang
◽
Chao Zhao
◽
Yushu Zhang
◽
Ming Yu
Keyword(s):
Network Security
◽
Attack Graph
◽
Graph Generation
Download Full-text
Exploring attack graph for cost-benefit security hardening: A probabilistic approach
Computers & Security
◽
10.1016/j.cose.2012.09.013
◽
2013
◽
Vol 32
◽
pp. 158-169
◽
Cited By ~ 59
Author(s):
Shuzhen Wang
◽
Zonghua Zhang
◽
Youki Kadobayashi
Keyword(s):
Probabilistic Approach
◽
Cost Benefit
◽
Attack Graph
◽
Security Hardening
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close