Login / Signup

A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack.

Feng YiHuang Yi CaiFu Zheng Xin
Published in: NAS (2018)
Keyphrases
  • attack graph
  • attack graphs
  • security risks
  • network configuration
  • enterprise network
  • alert correlation
  • security threats
  • phishing attacks
  • information security
  • network security
  • neural network
  • peer to peer