Sign in

Two Stochastic Models for Security Evaluation Based on Attack Graph.

Yinqian ZhangXun FanZhi XueHao Xu
Published in: ICYCS (2008)
Keyphrases
  • stochastic models
  • attack graph
  • enterprise network
  • stochastic model
  • stochastic processes
  • attack graphs
  • marginal distributions
  • security issues