메뉴 건너뛰기




Volumn , Issue , 2004, Pages 109-118

Managing attack graph complexity through visual hierarchical aggregation

Author keywords

Clustered graphs; Network attack graphs; Network attack modeling; Vulnerability analysis

Indexed keywords

ABSTRACTING; ALGORITHMS; COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; COMPUTER SOFTWARE; CONFORMAL MAPPING; MATHEMATICAL MODELS; SEMANTICS;

EID: 20444480299     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029208.1029225     Document Type: Conference Paper
Times cited : (222)

References (24)
  • 11
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher
    • S. Jajodia, S. Noel, B. O'Berry, "Topological Analysis of Network Attack Vulnerability," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher, 2003.
    • (2003) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.