메뉴 건너뛰기




Volumn , Issue , 2009, Pages 92-98

Attack graph generation with infused fuzzy clustering

Author keywords

Attack graph; Computer network security; Connectivity matrix; Fuzzy logic clustering; Privilege matrix

Indexed keywords

ATTACK GRAPH; CONNECTIVITY MATRIX; FUZZY C-MEANS; FUZZY LOGIC CLUSTERING; INITIAL CONDITIONS; INTRUSION DETECTION SYSTEMS; MATRIX; NETWORK ADMINISTRATOR; NETWORK CONDITION; NETWORK CONFIGURATION; PRO-ACTIVE APPROACH; VULNERABILITY ASSESSMENTS;

EID: 74549125798     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 4
    • 17744373483 scopus 로고    scopus 로고
    • Scenario Graphs and Attack Graph,
    • PhD Thesis, Carnegei Mellan University, USA, April
    • O. M. Sheynar, "Scenario Graphs and Attack Graph," PhD Thesis, Carnegei Mellan University, USA, April 2004.
    • (2004)
    • Sheynar, O.M.1
  • 7
    • 0015644825 scopus 로고
    • A fuzzy relative of the ISODATA process and its use in detecting compact well seperated clusters
    • J. C. Dunn., "A fuzzy relative of the ISODATA process and its use in detecting compact well seperated clusters", J. Cybernetics, Vol. 3, pp. 32-57, 1974.
    • (1974) J. Cybernetics , vol.3 , pp. 32-57
    • Dunn, J.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.