Computer Science ›› 2007, Vol. 34 ›› Issue (11): 50-55.
Previous Articles Next Articles
MAO Han-Dong, CHEN Feng ,ZHANG Wei-Ming, ZHU Cheng (School of Information System and Management, NUDT, Changsha 410073)
Online:
Published:
Abstract: In reality there is a variety of computer networks vulnerability, attacks are often used vulnerability gradually invasion ultimately achieve the target. This combination of network modeling study is conducive to attack the protective network security and
Key words: Network security, Multi-attack modeling, Security assess, Attack graph, Atom attack
MAO Han-Dong, CHEN Feng ,ZHANG Wei-Ming, ZHU Cheng (School of Information System and Management, NUDT, Changsha 410073). [J].Computer Science, 2007, 34(11): 50-55.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I11/50
Cited