메뉴 건너뛰기




Volumn 30, Issue 2, 2007, Pages 234-240

Research on network node correlation in network risk assessment

Author keywords

Network attack; Network node correlation; Network risk assessment; Network security; Vulnerability analysis

Indexed keywords

COMPUTER VIRUSES; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 34147194713     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (23)

References (5)
  • 4
    • 30644476485 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • Kumar V., Srivastava J. and Lazarevic A., New York: Springer
    • Jajodia S, Noel S, O'Berry B. Topological analysis of network attack vulnerability//Kumar V, Srivastava J, Lazarevic A et al. Managing Cyber Threats: Issues, Approaches and Challenges. New York: Springer, 2005: 248-266
    • (2005) Managing Cyber Threats: Issues, Approaches and Challenges , pp. 248-266
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.