您当前的位置:
首页 >
文章列表页 >
Host security assessment method based on attack graph
Papers | 更新时间:2024-06-05
    • Host security assessment method based on attack graph

    • Journal on Communications   Vol. 43, Issue 2, Pages: 89-99(2022)
    • DOI:10.11959/j.issn.1000-436x.2022030    

      CLC: TP393.08
    • Online First:2022-02

      Published:25 February 2022

    移动端阅览

  • Hongyu YANG, Haihang YUAN, Liang ZHANG. Host security assessment method based on attack graph[J]. Journal on Communications, 2022, 43(2): 89-99. DOI: 10.11959/j.issn.1000-436x.2022030.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1505

下载量

10

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Approach to making strategies for network security enhancement based on attack graphs
Method to generate attack graphs for assessing the overall security of networks
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
Research on network attack analysis method based on attack graph of absorbing Markov chain
Network intrusion intention analysis model based on Bayesian attack graph

Related Author

YANG Wu1
MAN Da-peng1
ZHANG Bing2
SI Jia-quan1
YANG Yong-tian1
ZHOU Yuan2
Zhiyong LUO
Yu ZHANG

Related Institution

Information Security Research Center, Harbin Engineering University
National Computer Network Emergency Response Technical Team/Coordination Center of China
School of Computer Science and Technology, Harbin University of Science and Technology
School of Information Management, Beijing Information Science and Technology University
School of Cyberspace Security,PLA Information Engineering University
0