J Zeng, S Wu, Y Chen, R Zeng… - Security and …, 2019 - Wiley Online Library
Attack graph can simulate the possible paths used by attackers to invade the network. By
using the attack graph, the administrator can evaluate the security of the network and …