Network Security Risk Assessment Based on Attack Graph.
Lixia XieXiao ZhangJiyong ZhangPublished in: J. Comput. (2013)
Keyphrases
- risk assessment
- network security
- attack graph
- attack graphs
- computer networks
- intrusion detection
- risk analysis
- network configuration
- intrusion detection system
- information security
- network traffic
- security policies
- traffic analysis
- dos attacks
- situation assessment
- network administrators
- emergency management
- anomaly detection
- case study
- data fusion
- dimensionality reduction
- cyber security
- smart grid