Login / Signup

Aggregating vulnerability metrics in enterprise networks using attack graphs.

John HomerSu ZhangXinming OuDavid SchmidtYanhui DuS. Raj RajagopalanAnoop Singhal
Published in: J. Comput. Secur. (2013)
Keyphrases
  • attack graphs
  • attack graph
  • network configuration
  • alert correlation
  • information systems
  • multistage