Access Graph to Analyze Network Vulnerabilities.
Xiaochun XiaoTiange ZhangGendu ZhangPublished in: PACIIA (2) (2008)
Keyphrases
- attack graph
- attack graphs
- network traffic
- complex networks
- sparsely connected
- graph theory
- fully connected
- graphical representation
- buffer overflow
- computer networks
- communication networks
- bipartite graph
- graph model
- network configuration
- network management
- spanning tree
- link prediction
- structured data
- random walk
- random graphs
- neural network
- security risks
- graph structure
- access control