Login / Signup
Two Stochastic Models for Security Evaluation Based on Attack Graph.
Yinqian Zhang
Xun Fan
Zhi Xue
Hao Xu
Published in:
ICYCS (2008)
Keyphrases
</>
stochastic models
attack graph
enterprise network
stochastic model
stochastic processes
attack graphs
marginal distributions
security issues