Computer Science ›› 2009, Vol. 36 ›› Issue (6): 44-46.
Previous Articles Next Articles
Online:
Published:
Abstract: A planning exploit graph model that can be used in information security risk process was proposed. The domain and problem of risk process was described in PDDL language, and the system information, vulnerabilities, threats and defenders were modeled based
Key words: Risk process, Planning exploit graph model, PDDL, Planning
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I6/44
Cited