Login / Signup
Identifying Critical Attack Assets in Dependency Attack Graphs.
Reginald E. Sawilla
Xinming Ou
Published in:
ESORICS (2008)
Keyphrases
</>
attack graphs
attack graph
attack scenarios
alert correlation
security vulnerabilities
network configuration
real time
neural network
association rules
dynamic programming