A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - dl.acm.org
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - infona.pl
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

[PDF][PDF] A taxonomy for attack graph generation and usage in network security

K Kaynar - 2016 - academia.edu
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …