[1] |
YANG Peian, LIU Baoxu, DU Xiangyu.
Portrait Analysis of Threat Intelligence for Attack Recognition
[J]. Computer Engineering, 2020, 46(1): 136-143.
|
[2] |
WANG Hui, LOU Yalong, DAI Tianwang, RU Xinxin, LIU Kun.
Vulnerability Evaluation Algorithm Based on BNAG Model
[J]. Computer Engineering, 2019, 45(9): 128-135,142.
|
[3] |
WANG Hui,LU Shikai,WANG Yincheng.
Intrusion Prediction Algorithm Based on Correlation Attack Graph
[J]. Computer Engineering, 2018, 44(7): 131-138.
|
[4] |
FAN Zihua,CHANG Chaowen,HAN Peisheng,PAN Dongcun.
Generation Method of Attack Graph Based on Rete Algorithm
[J]. Computer Engineering, 2018, 44(3): 151-155,165.
|
[5] |
WANG Hui,WANG Tengfei,LIU Shufen.
A Network Attack Path Prediction Method Based on ATI
[J]. Computer Engineering, 2016, 42(9): 132-137,143.
|
[6] |
WANG Hui,KANG Kaihang,LIU Shufen.
PASG Computational Model Based on Bayesian Inference
[J]. Computer Engineering, 2016, 42(11): 158-164.
|
[7] |
ZHANG Jing,LI Yan.
Rough Network Security Analysis Model Based on Dynamic Game
[J]. Computer Engineering, 2015, 41(4): 129-134.
|
[8] |
LIU Long, CHEN Xiu-zhen, LI Jian-hua.
Complete Attack Graph Automatic Generation Method Based on Attack Pattern
[J]. Computer Engineering, 2013, 39(10): 127-132.
|
[9] |
SHU Sui-Jiang, LIU Bao-Xu, LIU , YU , JIANG Zheng-Wei.
Nodes Risk Probability Algorithm in Attack Graph with Cycles
[J]. Computer Engineering, 2012, 38(3): 19-21,30.
|
[10] |
LI Qiang-Peng, ZHENG Lian-Qing, ZHANG Chuan-Rong, YANG Tong.
Optimization Method for Attack Graph Based on Vulnerability Exploit Correlation
[J]. Computer Engineering, 2012, 38(21): 129-132.
|
[11] |
SONG Shun-Hong, LIU Tu-Liang, JIA Yang, YUAN Huan.
Method of Network Attack Graph Generation Based on Greedy Policy
[J]. Computer Engineering, 2011, 37(2): 126-128.
|
[12] |
HUANG Guang-Qiu, CHENG Kai-Ge.
Expanded Petri Net Attack Model Based on Attack Graph
[J]. Computer Engineering, 2011, 37(10): 131-133.
|
[13] |
WANG Hang; GAO Qiang; MO Yu-chang.
Network Vulnerability Evaluation Based on Attack Graph and Security Metric
[J]. Computer Engineering, 2010, 36(3): 128-130.
|
[14] |
HUANG Guang-Qiu, LI Yan.
Privilege Control Security Analysis Model Oriented to Subject Vulnerability
[J]. Computer Engineering, 2010, 36(11): 148-151.
|
[15] |
LI Han; ZHANG Shao-jun; CHEN Xiu-zhen; CHEN Xiao-hua.
Analysis of Network Connectivity for Attack Graph Construction
[J]. Computer Engineering, 2009, 35(18): 116-118.
|