Network security equipment evaluation based on attack tree with risk fusion
Saved in:
| Main Authors: | Ran CHENG, Yue-ming LU |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2017-07-01
|
| Series: | 网络与信息安全学报 |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00183 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Evaluation method of network attack effect based on attack tree and CVSS
by: Pan Gang, et al.
Published: (2022-04-01) -
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
by: Kuei-Hu Chang
Published: (2014-01-01) -
Network security situation evaluation method for multi-step attack
by: Hao-pu YANG, et al.
Published: (2017-01-01) -
Risk assessment method for network attack surface based on Bayesian attack graph
by: Yuyang ZHOU, et al.
Published: (2018-06-01) -
RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy
by: Peng Li, et al.
Published: (2015-11-01)