Login / Signup
Computer attack modeling and security evaluation based on attack graphs.
Igor V. Kotenko
Andrey Chechulin
Published in:
IDAACS (2013)
Keyphrases
</>
attack graphs
attack graph
security vulnerabilities
attack scenarios
alert correlation
attack detection
computer systems
cyber attacks
security measures
network configuration
intrusion detection
intrusion detection system
information security
countermeasures
security issues
security requirements