메뉴 건너뛰기




Volumn , Issue , 2017, Pages 729-734

Optimal response to computer network threats

Author keywords

Attack Graph; Graph Theory; Network Security; Optimal Response; Security Threat; Vulnerability

Indexed keywords

BUDGET CONTROL; COST EFFECTIVENESS; GRAPH THEORY; IMMUNIZATION; SECURITY SYSTEMS;

EID: 85017615349     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISTEL.2016.7881919     Document Type: Conference Paper
Times cited : (3)

References (9)
  • 1
    • 84953439481 scopus 로고    scopus 로고
    • A comprehensive approach for network attack forecasting
    • M. GhasemiGol, A. Ghaemi-Bafghi, and H. Takabi, "A comprehensive approach for network attack forecasting," Computers & Security, vol. 58, pp. 83-105, 2016
    • (2016) Computers & Security , vol.58 , pp. 83-105
    • GhasemiGol, M.1    Ghaemi-Bafghi, A.2    Takabi, H.3
  • 4
    • 84904431191 scopus 로고    scopus 로고
    • Arito: Cyber-attack response system using accurate risk impact tolerance
    • A. Shameli-Sendi and M. Dagenais, "ARITO: Cyber-attack response system using accurate risk impact tolerance," International journal of information security, vol. 13, pp. 367-390, 2014
    • (2014) International Journal of Information Security , vol.13 , pp. 367-390
    • Shameli-Sendi, A.1    Dagenais, M.2
  • 6
    • 85017578696 scopus 로고    scopus 로고
    • Proactive intrusion prevention and response via attack graphs
    • S. Noel and S. Jajodia, "Proactive intrusion prevention and response via attack graphs," ed: Addison-Wesley Professional, 2009
    • (2009) Ed: Addison-Wesley Professional
    • Noel, S.1    Jajodia, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.