|
Volumn , Issue , 2009, Pages 92-98
|
Attack graph generation with infused fuzzy clustering
|
Author keywords
Attack graph; Computer network security; Connectivity matrix; Fuzzy logic clustering; Privilege matrix
|
Indexed keywords
ATTACK GRAPH;
CONNECTIVITY MATRIX;
FUZZY C-MEANS;
FUZZY LOGIC CLUSTERING;
INITIAL CONDITIONS;
INTRUSION DETECTION SYSTEMS;
MATRIX;
NETWORK ADMINISTRATOR;
NETWORK CONDITION;
NETWORK CONFIGURATION;
PRO-ACTIVE APPROACH;
VULNERABILITY ASSESSMENTS;
CLUSTER ANALYSIS;
CLUSTERING ALGORITHMS;
COMPUTER VIRUSES;
CRYPTOGRAPHY;
FUZZY CLUSTERING;
FUZZY LOGIC;
FUZZY SYSTEMS;
HUMAN COMPUTER INTERACTION;
INTERNET;
INTRUSION DETECTION;
VISUALIZATION;
NETWORK SECURITY;
|
EID: 74549125798
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (2)
|
References (12)
|