Login / Signup
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.
Lingyu Wang
Anyi Liu
Sushil Jajodia
Published in:
Comput. Commun. (2006)
Keyphrases
</>
alert correlation
attack graph
attack graphs
attack scenarios
intrusion detection system
intrusion detection
network configuration
attack detection
decision making
computer networks
security vulnerabilities