Towards scalable security analysis using multi-layered security models

JB Hong, DS Kim - Journal of Network and Computer Applications, 2016 - Elsevier
Security models, such as an attack graph (AG), are widely adopted to assess the security of
networked systems, such as utilizing various security metrics and providing a cost-effective …

Towards scalable security analysis using multi-layered security models

JB Hong, DS Kim - Journal of Network and Computer Applications, 2016 - dl.acm.org
Security models, such as an attack graph (AG), are widely adopted to assess the security of
networked systems, such as utilizing various security metrics and providing a cost-effective …

Towards scalable security analysis using multi-layered security models

JB Hong, DS Kim - Journal of Network and …, 2016 - research-repository.uwa.edu.au
Security models, such as an attack graph (AG), are widely adopted to assess the security of
networked systems, such as utilizing various security metrics and providing a cost-effective …

Towards scalable security analysis using multi-layered security models

JB Hong, DS Kim - Journal of Network and Computer Applications, 2016 - infona.pl
Security models, such as an attack graph (AG), are widely adopted to assess the security of
networked systems, such as utilizing various security metrics and providing a cost-effective …

[引用][C] Towards scalable security analysis using multi-layered security models

JB Hong, DS Kim - Journal of Network and Computer …, 2016 - espace.library.uq.edu.au
Security models, such as an attack graph (AG), are widely adopted to assess the security of
networked systems, such as utilizing various security metrics and providing a cost-effective …