ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Intrusion Alerts Analysis Using Attack Graphs and Clustering
Mapping Intimacies
◽
10.31979/etd.d3wx-m9xx
◽
2009
◽
Author(s):
Hardik Patel
Keyword(s):
Attack Graphs
◽
Intrusion Alerts
Download Full-text
Related Documents
Cited By
References
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
Computer Communications
◽
10.1016/j.comcom.2006.04.001
◽
2006
◽
Vol 29
(15)
◽
pp. 2917-2933
◽
Cited By ~ 107
Author(s):
Lingyu Wang
◽
Anyi Liu
◽
Sushil Jajodia
Keyword(s):
Attack Graphs
◽
Intrusion Alerts
Download Full-text
Two Formal Analysis of Attack Graphs
Journal of Software
◽
10.3724/sp.j.1001.2010.03584
◽
2010
◽
Vol 21
(4)
◽
pp. 838-848
◽
Cited By ~ 6
Author(s):
Feng CHEN
◽
Yi ZHANG
◽
Jin-Shu SU
◽
Wen-Bao HAN
Keyword(s):
Formal Analysis
◽
Attack Graphs
Download Full-text
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
IEEE Transactions on Control of Network Systems
◽
10.1109/tcns.2020.2988007
◽
2020
◽
Vol 7
(4)
◽
pp. 1585-1596
◽
Cited By ~ 3
Author(s):
Mustafa Abdallah
◽
Parinaz Naghizadeh
◽
Ashish R. Hota
◽
Timothy Cason
◽
Saurabh Bagchi
◽
...
Keyword(s):
Attack Graphs
◽
Game Theoretic
◽
Security Investments
Download Full-text
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
◽
10.1109/trustcom50675.2020.00030
◽
2020
◽
Author(s):
Isaac Matthews
◽
John Mace
◽
Sadegh Soudjani
◽
Aad van Moorsel
Keyword(s):
Computational Approach
◽
Attack Graphs
Download Full-text
Using vulnerability information and attack graphs for intrusion detection
2010 Sixth International Conference on Information Assurance and Security
◽
10.1109/isias.2010.5604041
◽
2010
◽
Cited By ~ 5
Author(s):
Sebastian Roschke
◽
Feng Cheng
◽
Christoph Meinel
Keyword(s):
Intrusion Detection
◽
Attack Graphs
Download Full-text
Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs
2009 International Symposium on Information Engineering and Electronic Commerce
◽
10.1109/ieec.2009.24
◽
2009
◽
Author(s):
Feng Chen
◽
Ri Tu
◽
Yi Zhang
◽
Jinshu Su
Keyword(s):
Network Security
◽
Attack Graphs
Download Full-text
Honeypot Allocation Games over Attack Graphs for Cyber Deception
10.1002/9781119723950.ch4
◽
2021
◽
pp. 62-76
Author(s):
Ahmed H. Anwar
◽
Charles A. Kamhoua
◽
Nandi Leslie
◽
Christopher D. Kiekintveld
Keyword(s):
Attack Graphs
Download Full-text
Security Vulnerability Analysis using Ontology-based Attack Graphs
2017 14th IEEE India Council International Conference (INDICON)
◽
10.1109/indicon.2017.8488002
◽
2017
◽
Author(s):
Komal Falodiya
◽
Manik Lal Das
Keyword(s):
Vulnerability Analysis
◽
Attack Graphs
◽
Security Vulnerability
Download Full-text
Towards Metric-Driven, Application-Specific Visualization of Attack Graphs
Manual of Complex Abdominal Wall Reconstruction
◽
10.1007/978-3-319-51966-1_8
◽
2016
◽
pp. 117-134
Author(s):
Mickael Emirkanian-Bouchard
◽
Lingyu Wang
Keyword(s):
Attack Graphs
◽
Application Specific
Download Full-text
A Bio-inspired Approach to Attack Graphs Analysis
Cyberspace Safety and Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-01689-0_5
◽
2018
◽
pp. 63-76
Author(s):
Vincenzo Conti
◽
Simone Sante Ruffo
◽
Alessio Merlo
◽
Mauro Migliardi
◽
Salvatore Vitabile
Keyword(s):
Attack Graphs
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close