메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 160-169

Understanding complex network attack graphs through clustered adjacency matrices

Author keywords

[No Author keywords available]

Indexed keywords

ADJACENCY MATRIX; NETWORK ATTACK GRAPHS; QUADRATIC COMPLEXITY;

EID: 33846293304     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.58     Document Type: Conference Paper
Times cited : (90)

References (16)
  • 2
    • 30644476485 scopus 로고    scopus 로고
    • Topological Analysis of Network Attack Vulnerability
    • V. Kumar, J. Srivastava, A. Lazarevic eds, Kluwer Academic Publisher
    • S. Jajodia, S. Noel, B. O'Berry, "Topological Analysis of Network Attack Vulnerability," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher, 2005.
    • (2005) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 14
    • 33749560322 scopus 로고    scopus 로고
    • A Tutorial Introduction to the Minimum Description Length Principle
    • P. Grünwald, I. Myung, M. Pitt eds, MIT Press
    • P. Grünwald, "A Tutorial Introduction to the Minimum Description Length Principle," in Advances in Minimum Description Length: Theory and Applications, P. Grünwald, I. Myung, M. Pitt (eds.), MIT Press, 2005.
    • (2005) Advances in Minimum Description Length: Theory and Applications
    • Grünwald, P.1
  • 16
    • 33846313418 scopus 로고    scopus 로고
    • Nessus open source vulnerability scanner project, web, last accessed May 2005
    • Nessus open source vulnerability scanner project, web page, http://www.nessus.org/. last accessed May 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.