周明, 吕世超, 游建舟, 朱红松, 石志强… - Journal of Cyber Security …, 2022 - jcs.iie.ac.cn
… graph, Bayesian attack graph, and Markov model; Once the attack model is built, we use the
… the possible results appearing in the future, such as attack events, infected devices, and “0-…