Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
Hamid Reza ShahriariRasool JaliliPublished in: Comput. Secur. (2007)
Keyphrases
- buffer overflow
- attack graphs
- attack graph
- security risks
- security vulnerabilities
- dos attacks
- denial of service
- network model
- network traffic
- network structure
- data flow
- complex networks
- network administrators
- small world
- data mining
- network parameters
- distributed network
- communication networks
- peer to peer
- case study