|
Volumn , Issue , 2004, Pages 109-118
|
Managing attack graph complexity through visual hierarchical aggregation
|
Author keywords
Clustered graphs; Network attack graphs; Network attack modeling; Vulnerability analysis
|
Indexed keywords
ABSTRACTING;
ALGORITHMS;
COMPUTATIONAL COMPLEXITY;
COMPUTATIONAL METHODS;
COMPUTER SOFTWARE;
CONFORMAL MAPPING;
MATHEMATICAL MODELS;
SEMANTICS;
CLUSTERED GRAPHS;
NETWORK ATTACK GRAPHS;
NETWORK ATTACK MODELING;
VULNERABILITY ANALYSIS;
GRAPH THEORY;
|
EID: 20444480299
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1029208.1029225 Document Type: Conference Paper |
Times cited : (222)
|
References (24)
|