[1] |
JHA S , SHEYNER O , WING J M . Two formal analyses of attack graphs[A]. Proceedings of 15th IEEE Computer Security Foundations Workshop[C]. 2002.
|
[2] |
NOEL S , JAJODIA S , O'BERRY B , JACOBS M , et al. Efficient minimum-cost network hardening via exploit dependency graphs[A]. Proceedings of 19th Annual Computer Security Applications Conference[C]. 2003.86-95.
|
[3] |
WANG L Y , NOEL S , JAJODIA S . Minimum-cost network hardening using attack graphs[J]. Computer Communications, 2006,29(18): 3812-3824.
|
[4] |
HOMER J , , et al. From Attack Graphs to Automated Configuration Management-An Iterative Approach[R]. Kansas State University Technical Report, 2008.
|
[5] |
SI J Q , ZHANG B , MAN D P , et al. Approach to making strategies for network security enhancement based on attack graphs[J]. Journal on Commurtications, 2009,30(2): 123-128.
|
[6] |
CHEN F , WANG L Y , SU J S . An efficient approach to minimum-cost network hardening using attack graphs[A]. Proceedings of the 4th International Conference on Information Assurance and Security[C]. 2008. 209-212.
|
[7] |
CHEN F , ZHANG Y , SU J S , et al. Two formal analyses of attack graphs[J]. Journal of Software, 2010,21(4): 838-848.
|
[8] |
CHEN F . A Hierarchical Network Security Risk Evaluation Approach Based on Multi-goal Attack Graph[D]. National University of Defense Technology, 2008.
|
[9] |
ALBANESE M , JAJODIA S , NOEL S . Time-efficient and cost- effective network hardening using attack graphs[A]. Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)[C]. 2012. 1-12.
|
[10] |
DIAMAH A , MOHAMMADIA M , BALACHANDRAN B . Network security evaluation method via attack graphs and fuzzy cognitive maps[J]. Intelligent Decision Technologies, 2012,16: 433-440.
|
[11] |
SWILER L P , PHILLIPS C , ELLIS D , et al. Computer-attack graph generation tool[A]. Proceedings of DARPA Information Survivability Conference &Exposition II[C]. 2001. 307-321.
|
[12] |
SHEYNER O , HAINES J , JHA S , et al. Automated generation and analysis of attack graphes[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. 2002. 273-284.
|
[13] |
SHEYNER O . Scenario Graphs and Attack Graphs[D]. Carnegie Mellon University, 2004.
|
[14] |
AMMANN P , WIJESEKERA D , KAUSHIK S . Scalable,graph-based network vulnerability analysis[A]. Proceedings of the 9th ACM Conference on Computer and Communications Security[C]. 2002. 217-224.
|
[15] |
LIPPMANN R P , et al. An Annotated Review of Past Papers on Attack Graphs[R]. MIT Lincoln Laboratory, 2005.
|
[16] |
LIPPMANN R P , INGOLS K W , SCOTT C , et al. Evaluating and Strengthening Enterprise Network Security Using Attack Graphs[R]. ESC-TR-2005-064,MIT Lincoln Laboratory, 2005.
|
[17] |
OU X M , GOVINDAVAJHALA S , APPEL A W . MulVAL:a logic-based network security analyzer[A]. Proceedings of 14th USENIX Security Symposium[C]. 2005,8.
|
[18] |
OU X M , BOYER W F , MCQUEEN M A . A scalable approach to attack graph generation[A]. Proceedings of 13th ACM conference on Computer and Communications Security[C]. 2006. 336-345.
|
[19] |
CHEN F , TU R , ZHANG Y , et al. Two scalable approaches to analyzing network security using compact attack graphs[A]. Proceedings of International Symposium on Information Engineering and Electronic Commerce[C]. 2009. 90-94.
|
[20] |
CHEN F , SUN J S , HAN W B . AI planning-based approach of attack graph generation[J]. Journal of PLA University of Science and Technology, 2008,9(5): 460-465.
|
[21] |
MAN D P , ZHOU Y , YANG W , et al. Method to generate attack graphs for assessing the overall security of networks[J]. Journal on Commurtications, 2009,30(3): 1-5.
|
[22] |
HOMER J , VARIKUTI A , OU XM , et al. Improving attack graph visualization through data reduction and attack grouping[A]. Proceedings of 5th International Workshop on Visualization for Cyber Security[C]. 2008. 68-79.
|
[23] |
HARBORT Z , LOUTHAN G , HALE J , et al. Techniques for attack graph visualization and interaction[A]. Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research[C]. 2011.
|
[24] |
ALHOMIDI M A , REED M J . Attack graphs representations[A]. Proceedings of 4th Computer Science and Electronic Engineering Conference (CEEC)[C]. 2012.83-88.
|