Login / Signup
Use of Attack Graphs in Security Systems.
Vivek Shandilya
Chris B. Simmons
Sajjan G. Shiva
Published in:
J. Comput. Networks Commun. (2014)
Keyphrases
</>
security systems
attack graphs
attack graph
rule based systems
security mechanisms
alert correlation
network configuration
information systems
real time
data warehouse
access control
attack scenarios