Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
A survey on systems security metrics
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
The security and privacy of mobile-edge computing: An artificial intelligence perspective
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …
and information technology (IT) services to be delivered at the network's edge. By shifting …
Dynamic security risk management using bayesian attack graphs
Security risk assessment and mitigation are two vital processes that need to be executed to
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
NICE: Network intrusion detection and countermeasure selection in virtual network systems
Cloud security is one of most important issues that has attracted a lot of research and
development effort in past few years. Particularly, attackers can explore vulnerabilities of a …
development effort in past few years. Particularly, attackers can explore vulnerabilities of a …
Power system reliability evaluation with SCADA cybersecurity considerations
As information and communication networks are highly interconnected with the power grid,
cyber security of the supervisory control and data acquisition (SCADA) system has become …
cyber security of the supervisory control and data acquisition (SCADA) system has become …
An attack graph-based probabilistic security metric
L Wang, T Islam, T Long, A Singhal… - Data and Applications …, 2008 - Springer
To protect critical resources in today's networked environments, it is desirable to quantify the
likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now …
likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now …
Using Bayesian networks for cyber security analysis
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …
enterprise networks. However, there has been insufficient effort in studying what modeling …
A taxonomy for attack graph generation and usage in network security
K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …
network. They can be used in determining both proactive and reactive security measures …