• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Vulnerability Evaluating Based on Attack Graph.

Chunlu WangYu BaoXuesen LiangTianle Zhang
Published in: ISCTCS (2012)
Keyphrases
  • attack graphs
  • attack graph
  • enterprise network
  • alert correlation
  • network configuration
  • neural network
  • countermeasures