2012
DOI: 10.1007/978-3-642-34062-8_6
|View full text |Cite
|
Sign up to set email alerts
|

A Vulnerability Attack Graph Generation Method Based on Scripts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Adversary: [45,319,234,222]; Malefactor: [209,139,358]; Actor: [80,146,204,364]; Hacker: [326,130,86,56,89,374,39,227,95,110,155,52,167,185,249,219,222,73,143,164,407,22,50,207,246,42,148,204,109,189,221]; Crook: [363] [364] [242]; Mis-actor: [363] 2 ; Assailant: [32,117,338,145,109]; Misuser: [363,…”
Section: Attack Modelling Techniques (Amts)mentioning
confidence: 99%
“…Adversary: [45,319,234,222]; Malefactor: [209,139,358]; Actor: [80,146,204,364]; Hacker: [326,130,86,56,89,374,39,227,95,110,155,52,167,185,249,219,222,73,143,164,407,22,50,207,246,42,148,204,109,189,221]; Crook: [363] [364] [242]; Mis-actor: [363] 2 ; Assailant: [32,117,338,145,109]; Misuser: [363,…”
Section: Attack Modelling Techniques (Amts)mentioning
confidence: 99%