Login / Signup

Identifying Critical Attack Assets in Dependency Attack Graphs.

Reginald E. SawillaXinming Ou
Published in: ESORICS (2008)
Keyphrases
  • attack graphs
  • attack graph
  • attack scenarios
  • alert correlation
  • security vulnerabilities
  • network configuration
  • real time
  • neural network
  • association rules
  • dynamic programming