Computer Science ›› 2009, Vol. 36 ›› Issue (6): 44-46.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: A planning exploit graph model that can be used in information security risk process was proposed. The domain and problem of risk process was described in PDDL language, and the system information, vulnerabilities, threats and defenders were modeled based

Key words: Risk process, Planning exploit graph model, PDDL, Planning

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!