An attack graph generation method based on heuristic searching strategy

S Wang, G Tang, G Kou, Y Chao - 2016 2nd IEEE International …, 2016 - ieeexplore.ieee.org
Aiming at the problem that it is difficult to generate attack graph for large-scale network, an
approach is proposed to generate global attack graph based on heuristic searching strategy …

贝叶斯属性攻击图网络脆弱性评估

王秀娟, 孙博, 廖彦文, 相从斌 - 北京邮电大学学报, 2015 - journal.bupt.edu.cn
为了准确全面地评估计算机网络脆弱性, 对攻击图中存在的攻击环路, 状态爆炸,
难以量化分析等问题进行了研究, 提出了属性攻击图向贝叶斯网络转化的方法和新的环路消除 …

Network security assessment based on full host-based attack graph

X Wang, T Zhou, J Zhu - … of the 2020 International Conference on …, 2020 - dl.acm.org
Network security assessment is an important method of evaluating network security. The
existing researches of network security assessment have the problem that the method is not …

测度属性关系分析的分布式系统异常检测

张乐君, 国林, 张健沛, 杨静, 夏磊 - 北京邮电大学学报, 2013 - journal.bupt.edu.cn
针对分布式系统的特点, 提出了一种基于网格空间的测度属性关联度计算方法,
并以此建立了网络模型来刻画分布式系统测度属性的关系; 提出了基于隐马尔可夫模型的测度 …