Network security equipment evaluation based on attack tree with risk fusion
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2017-07-01
|
| Series: | 网络与信息安全学报 |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00183 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850091907991994368 |
|---|---|
| author | Ran CHENG Yue-ming LU |
| author_facet | Ran CHENG Yue-ming LU |
| author_sort | Ran CHENG |
| collection | DOAJ |
| format | Article |
| id | doaj-art-6de7264ed3dc4e0fb88144601be19bf8 |
| institution | DOAJ |
| issn | 2096-109X |
| language | English |
| publishDate | 2017-07-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-6de7264ed3dc4e0fb88144601be19bf82025-08-20T02:42:15ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-07-013707759551075Network security equipment evaluation based on attack tree with risk fusionRan CHENGYue-ming LUhttp://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00183 |
| spellingShingle | Ran CHENG Yue-ming LU Network security equipment evaluation based on attack tree with risk fusion 网络与信息安全学报 |
| title | Network security equipment evaluation based on attack tree with risk fusion |
| title_full | Network security equipment evaluation based on attack tree with risk fusion |
| title_fullStr | Network security equipment evaluation based on attack tree with risk fusion |
| title_full_unstemmed | Network security equipment evaluation based on attack tree with risk fusion |
| title_short | Network security equipment evaluation based on attack tree with risk fusion |
| title_sort | network security equipment evaluation based on attack tree with risk fusion |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00183 |
| work_keys_str_mv | AT rancheng networksecurityequipmentevaluationbasedonattacktreewithriskfusion AT yueminglu networksecurityequipmentevaluationbasedonattacktreewithriskfusion |