Login / Signup

A scalable approach to attack graph generation.

Xinming OuWayne F. BoyerMiles A. McQueen
Published in: CCS (2006)
Keyphrases
  • attack graph
  • attack graphs
  • enterprise network
  • alert correlation
  • network configuration
  • information systems
  • response time