A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow

To solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between n...

Full description

Bibliographic Details
Main Authors: Huan Wang, Zhanfang Chen, Jianping Zhao, Xiaoqiang Di, Dan Liu
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8290918/

Similar Items