Login / Signup

A planner-based approach to generate and analyze minimal attack graph.

Nirnay GhoshSoumya K. Ghosh
Published in: Appl. Intell. (2012)
Keyphrases
  • attack graph
  • attack graphs
  • enterprise network
  • heuristic search
  • network configuration