C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Vulnerability Evaluating Based on Attack Graph.
Chunlu Wang
Yu Bao
Xuesen Liang
Tianle Zhang
Published in:
ISCTCS (2012)
Keyphrases
</>
attack graphs
attack graph
enterprise network
alert correlation
network configuration
neural network
countermeasures