L Zhiyong, Y Bo, X Jiazhong, Y Guixin… - International Journal of …, 2013 - earticle.net
In order to discover the network vulnerability timely and solve the very serious problems of
network security, this paper puts forward the attack graph which is based on intrusion …