您当前的位置:
首页 >
文章列表页 >
Alert processing based on attack graph and multi-source analyzing
academic paper | 更新时间:2024-06-05
    • Alert processing based on attack graph and multi-source analyzing

    • Journal on Communications   Vol. 36, Issue 9, Pages: 135-144(2015)
    • DOI:10.11959/j.issn.1000-436x.2015193    

      CLC: TP302
    • Online First:2015-09

      Published:25 September 2015

    移动端阅览

  • Wei-xin LIU, Kang-feng ZHENG, Bin WU, et al. Alert processing based on attack graph and multi-source analyzing[J]. Journal on Communications, 2015, 36(9): 135-144. DOI: 10.11959/j.issn.1000-436x.2015193.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1965

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Survey on application of attack graph technology
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
Research on network attack analysis method based on attack graph of absorbing Markov chain
Host security assessment method based on attack graph
Network intrusion intention analysis model based on Bayesian attack graph

Related Author

An-kang JU
Chen-dong WANG
Yuan-bo GUO
Zi-wei YE
Zhiyong LUO
Yu ZHANG
Qing WANG
Weiwei SONG

Related Institution

School of Cyberspace Security,PLA Information Engineering University
State Key Laboratory of Mathematical Engineering and Advanced Computing
School of Computer Science and Technology, Harbin University of Science and Technology
School of Information Management, Beijing Information Science and Technology University
College of Safety Science and Engineering, Civil Aviation University of China
0