Login / Signup

A Heuristic Method of Attack Graph Analysis for Network Security Hardening.

Chao ZhaoHuiqiang WangFangfang GuoMo ZhouYushu Zhang
Published in: CyberC (2014)
Keyphrases
  • network security
  • dynamic programming
  • cost function
  • data analysis
  • intrusion detection
  • optimal solution
  • object recognition
  • pairwise
  • e government
  • unsupervised learning
  • anomaly detection
  • multistage
  • security policies