Computer Science ›› 2016, Vol. 43 ›› Issue (10): 130-134.doi: 10.11896/j.issn.1002-137X.2016.10.024
Previous Articles Next Articles
QI Yong, MO Xuan and LI Qian-mu
[1] Yigit B,Gur G,Alagoz F.Cost-Aware Network Hardening with Limited Budget Using Compact Attack Graphs[C]∥2014 IEEE Military Communications Conference (MILCOM).IEEE,2014:152-157 [2] Dantu R,Loper K,Kolan P.Risk management using behaviorbased attack graphs[C]∥International Conference on Information Technology:Coding and Computing(ITCC 2004).Las Vegas:IEEE,2004:445-449 [3] Poolsappasit N,Dewri R,Ray I.Dynamic security risk management using bayesian attack graphs[J].IEEE Transactions on Dependable and Secure Computing,2012,9(1):61-74 [4] Albanese M,Jajodia S,Noel S.Time-efficient and cost-effective network hardening using attack graphs[C]∥2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).IEEE,2012:1-12 [5] Wang S,Zhang Z,Kadobayashi Y.Exploring attack graph for cost-benefit security hardening:A probabilistic approach[J].Computers & Security,2013,32:158-169 [6] Luo Zhi-yong,Sun Guang-lu,Liu Jia-hui,et al.Application of attack graphs algorithms in intrution prevention system[J].Journal of Yunnan University,2012,34(3):271-275(in Chinese) 罗智勇,孙广路,刘嘉辉,等.攻击图算法在入侵防御系统中的应用[J].云南大学学报(自然科学版),2012,34(3):271-275 [7] Liu Gang,Li Qian-mu,Zhang Hong.Defense strategy generation method for network security based on state attack-defense graph[J].Journal of Computer Applications,2013,33(S1):121-125(in Chinese) 刘刚,李千目,张宏.基于状态攻防图模型的网络安全防御策略生成方法[J].计算机应用,2013,33(S1):121-125 [8] Mell P,Scarfone K.Improving the common vulnerability scoring system[J].IET Information Security,2007,1(3):119-127 [9] Wang Yu-long,Yi Yang.PVL:A Novel Metric for Single Vulnerability Rating and Its Application in IMS[J].Journal of Computational Information Systems,2012,8(2):579-590 [10] Spanos G,Angelis L.Impact Metrics of Security Vulnerabilities:Analysis and Weighing[J].Information Security Journal A Global Perspective,2015,24(1-3):1-15 [11] Ye Yun,Xu Xi-shan,Jia Yan,et al.An Attack Graph Based Probabilistics Computing Approach of Network Security[J].Chinese Journal of Computers,2010,33(10):1987-1996(in Chinese)叶云,徐锡山,贾焰,等.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996 [12] Li Qing-peng,Wang Bu-hong,Wang Xiao-dong,et al.Network security assessment based on probabilities of attack graph nodes[J].Application Research of Computers,2013,0(3):906-908(in Chinese) 李庆朋,王布宏,王晓东,等.基于攻击图节点概率的网络安全度量方法[J].计算机应用研究,2013,30(3):906-908 |
No related articles found! |
|