Login / Signup

Use of Attack Graphs in Security Systems.

Vivek ShandilyaChris B. SimmonsSajjan G. Shiva
Published in: J. Comput. Networks Commun. (2014)
Keyphrases
  • security systems
  • attack graphs
  • attack graph
  • rule based systems
  • security mechanisms
  • alert correlation
  • network configuration
  • information systems
  • real time
  • data warehouse
  • access control
  • attack scenarios