Login / Signup
Exploring attack graph for cost-benefit security hardening: A probabilistic approach.
Shuzhen Wang
Zonghua Zhang
Youki Kadobayashi
Published in:
Comput. Secur. (2013)
Keyphrases
</>
cost benefit
attack graph
enterprise network
attack graphs
privacy concerns
network configuration
alert correlation
bayesian networks
security issues
network security
network management
data mining
security requirements
security mechanisms
information security
intrusion detection
social networks