Intelligent Attack Graph Generator Adapting to Large Vulnerability Information
碩士 === 中原大學 === 資訊工程研究所 === 91 === Vulnerability analysis is important to ensure the security of a network environment. Critical services in a network environment with vulnerabilities are vulnerable if there are attack paths leading to the services. Many tools based on graph theory have been propose...
Main Authors: | Chung-Yin Lin, 林崇頤 |
---|---|
Other Authors: | Hsiao-Rong Tyan |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/4n7f8w |
Similar Items
-
The Research on the Development of an Intelligent Vulnerability Attack Prevention Mechanism
by: Yi-Ta Wang, et al.
Published: (2007) -
Performance analysis of automated attack graph generation software
by: Cullum, James J.
Published: (2012) -
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
by: Huan Wang, et al.
Published: (2018-01-01) -
Analyzing and adapting graph algorithms for large persistent graphs
by: Larsson, Patrik
Published: (2008) -
Attack graph compression
by: Long, Tao
Published: (2009)