Login / Signup
Vulnerability Evaluating Based on Attack Graph.
Chunlu Wang
Yu Bao
Xuesen Liang
Tianle Zhang
Published in:
ISCTCS (2012)
Keyphrases
</>
attack graphs
attack graph
enterprise network
alert correlation
network configuration
neural network
countermeasures