Sign in

A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks.

Alaa T. Al GhazoMariam IbrahimHao RenRatnesh Kumar
Published in: IEEE Trans. Syst. Man Cybern. Syst. (2020)
Keyphrases
  • enterprise network
  • attack graph
  • attack graphs
  • computer systems
  • control system
  • computer networks
  • data analysis
  • key management
  • network configuration
  • alert correlation
  • data mining
  • supervisory control