2018
DOI: 10.1007/978-981-13-2095-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity: A Survey of Vulnerability Analysis and Attack Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The service 0 is stopped in host 1, resulting the only change in the NW as shown in boldface. Then, the defender takes an action (2,1), indicating the action to stop service 1 on host 2. This action results in a change in the network status, as shown in boldface.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The service 0 is stopped in host 1, resulting the only change in the NW as shown in boldface. Then, the defender takes an action (2,1), indicating the action to stop service 1 on host 2. This action results in a change in the network status, as shown in boldface.…”
Section: Resultsmentioning
confidence: 99%
“…A post-condition is a logical formula describes the effect of an action in the network system. Various approaches to attack graph generation have been proposed (see a recent survey [1]).…”
Section: A the Game Arena Of Cyber-deception Gamementioning
confidence: 99%
“…Once an attacker has access to the network's first level, they will attempt to breach every defensive system level. To identify vulnerabilities before the attackers do, the defender needs to be more driven to investigate security at all levels utilizing tools [25].…”
Section: Conceptsmentioning
confidence: 99%