Login / Signup
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack.
Feng Yi
Huang Yi Cai
Fu Zheng Xin
Published in:
NAS (2018)
Keyphrases
</>
attack graph
attack graphs
security risks
network configuration
enterprise network
alert correlation
security threats
phishing attacks
information security
network security
neural network
peer to peer