Login / Signup
A Vulnerability Attack Graph Generation Method Based on Scripts.
Bo Han
Qing Wang
Fajiang Yu
Xianda Zhang
Published in:
ICICA (LNCS) (2012)
Keyphrases
</>
generation method
attack graphs
attack graph
enterprise network
alert correlation
network configuration
security vulnerabilities
real time
neural network
data mining
cost function
anomaly detection
random variables
attack scenarios