تحميل...
New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks
The attack graph (AG) is an abstraction technique that reveals the ways an attacker can use to leverage vulnerabilities in a given network to violate security policies. The analyses developed to extract security-relevant properties are referred to as AG-based security evaluations. In recent years, m...
محفوظ في:
المؤلفون الرئيسيون: | , , , , |
---|---|
التنسيق: | Artigo |
اللغة: | Inglês |
منشور في: |
Hindawi Limited
2018-01-01
|
سلاسل: | Mathematical Problems in Engineering |
الوصول للمادة أونلاين: | http://dx.doi.org/10.1155/2018/4278632 |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|