您当前的位置:
首页 >
文章列表页 >
Approach to making strategies for network security enhancement based on attack graphs
更新时间:2024-10-14
    • Approach to making strategies for network security enhancement based on attack graphs

    • Vol. 30, Issue 2, Pages: 123-128(2009)
    • CLC: TP393.08
    • Published:2009

    移动端阅览

  • SI Jia-quan1, ZHANG Bing2, MAN Da-peng1, et al. Approach to making strategies for network security enhancement based on attack graphs[J]. 2009, 30(2): 123-128. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

914

下载量

7

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Method to generate attack graphs for assessing the overall security of networks
Host security assessment method based on attack graph
Network intrusion intention analysis model based on Bayesian attack graph
Multi-type honeypot deployment scheme based on Stackelberg game and DQN
Survey of research on Tor-based anonymous networking technologies

Related Author

ZHOU Yuan2
YANG Yong-tian1
Hongyu YANG
Haihang YUAN
Liang ZHANG
Zhiyong LUO
Xu YANG
Jiahui LIU

Related Institution

College of Safety Science and Engineering, Civil Aviation University of China
College of Computer Science and Technology, Civil Aviation University of China
College of Information, University of Arizona
School of Computer Science and Technology, Harbin University of Science and Technology
School of Computer Science and Engineering, Xi’an University of Technology
0