Network security equipment evaluation based on attack tree with risk fusion

Saved in:
Bibliographic Details
Main Authors: Ran CHENG, Yue-ming LU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-07-01
Series:网络与信息安全学报
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00183
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530215423016960
author Ran CHENG
Yue-ming LU
author_facet Ran CHENG
Yue-ming LU
author_sort Ran CHENG
collection DOAJ
format Article
id doaj-art-6de7264ed3dc4e0fb88144601be19bf8
institution Kabale University
issn 2096-109X
language English
publishDate 2017-07-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-6de7264ed3dc4e0fb88144601be19bf82025-01-15T03:05:57ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-07-013707759551075Network security equipment evaluation based on attack tree with risk fusionRan CHENGYue-ming LUhttp://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00183
spellingShingle Ran CHENG
Yue-ming LU
Network security equipment evaluation based on attack tree with risk fusion
网络与信息安全学报
title Network security equipment evaluation based on attack tree with risk fusion
title_full Network security equipment evaluation based on attack tree with risk fusion
title_fullStr Network security equipment evaluation based on attack tree with risk fusion
title_full_unstemmed Network security equipment evaluation based on attack tree with risk fusion
title_short Network security equipment evaluation based on attack tree with risk fusion
title_sort network security equipment evaluation based on attack tree with risk fusion
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00183
work_keys_str_mv AT rancheng networksecurityequipmentevaluationbasedonattacktreewithriskfusion
AT yueminglu networksecurityequipmentevaluationbasedonattacktreewithriskfusion