Login / Signup

Vulnerability Evaluating Based on Attack Graph.

Chunlu WangYu BaoXuesen LiangTianle Zhang
Published in: ISCTCS (2012)
Keyphrases
  • attack graphs
  • attack graph
  • enterprise network
  • alert correlation
  • network configuration
  • neural network
  • countermeasures