Computer Science ›› 2007, Vol. 34 ›› Issue (11): 50-55.

Previous Articles     Next Articles

MAO Han-Dong, CHEN Feng ,ZHANG Wei-Ming, ZHU Cheng (School of Information System and Management, NUDT, Changsha 410073)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: In reality there is a variety of computer networks vulnerability, attacks are often used vulnerability gradually invasion ultimately achieve the target. This combination of network modeling study is conducive to attack the protective network security and

Key words: Network security, Multi-attack modeling, Security assess, Attack graph, Atom attack

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!