Overview on attack graph generation and visualization technology. Yi, S., Peng, Y., Xiong, Q., Wang, T., Dai, Z., Gao, H., Xu, J., Wang, J., & Xu, L. In 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID), pages 1-6, 2013. doi bibtex @inproceedings{Yi2013,
author = {Yi, Shengwei and Peng, Yong and Xiong, Qi and Wang, Ting and Dai, Zhonghua and Gao, Haihui and Xu, Junfeng and Wang, Jiteng and Xu, Lijuan},
booktitle = {2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)},
title = {Overview on attack graph generation and visualization technology},
year = {2013},
volume = {},
number = {},
pages = {1-6},
keywords = {Security;Visualization;Complexity theory;Communication networks;Risk analysis;Algorithm design and analysis;Databases;Attack Graph;Visualization;Attack Paths;Network Vulnerability Analysis},
doi = {10.1109/ICASID.2013.6825274}
}
Downloads: 0
{"_id":"f8g7PiReyHW6iSs3D","bibbaseid":"yi-peng-xiong-wang-dai-gao-xu-wang-etal-overviewonattackgraphgenerationandvisualizationtechnology-2013","author_short":["Yi, S.","Peng, Y.","Xiong, Q.","Wang, T.","Dai, Z.","Gao, H.","Xu, J.","Wang, J.","Xu, L."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Yi"],"firstnames":["Shengwei"],"suffixes":[]},{"propositions":[],"lastnames":["Peng"],"firstnames":["Yong"],"suffixes":[]},{"propositions":[],"lastnames":["Xiong"],"firstnames":["Qi"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Ting"],"suffixes":[]},{"propositions":[],"lastnames":["Dai"],"firstnames":["Zhonghua"],"suffixes":[]},{"propositions":[],"lastnames":["Gao"],"firstnames":["Haihui"],"suffixes":[]},{"propositions":[],"lastnames":["Xu"],"firstnames":["Junfeng"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Jiteng"],"suffixes":[]},{"propositions":[],"lastnames":["Xu"],"firstnames":["Lijuan"],"suffixes":[]}],"booktitle":"2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)","title":"Overview on attack graph generation and visualization technology","year":"2013","volume":"","number":"","pages":"1-6","keywords":"Security;Visualization;Complexity theory;Communication networks;Risk analysis;Algorithm design and analysis;Databases;Attack Graph;Visualization;Attack Paths;Network Vulnerability Analysis","doi":"10.1109/ICASID.2013.6825274","bibtex":"@inproceedings{Yi2013,\n author = {Yi, Shengwei and Peng, Yong and Xiong, Qi and Wang, Ting and Dai, Zhonghua and Gao, Haihui and Xu, Junfeng and Wang, Jiteng and Xu, Lijuan},\n booktitle = {2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)},\n title = {Overview on attack graph generation and visualization technology},\n year = {2013},\n volume = {},\n number = {},\n pages = {1-6},\n keywords = {Security;Visualization;Complexity theory;Communication networks;Risk analysis;Algorithm design and analysis;Databases;Attack Graph;Visualization;Attack Paths;Network Vulnerability Analysis},\n doi = {10.1109/ICASID.2013.6825274}\n}\n\n","author_short":["Yi, S.","Peng, Y.","Xiong, Q.","Wang, T.","Dai, Z.","Gao, H.","Xu, J.","Wang, J.","Xu, L."],"key":"Yi2013","id":"Yi2013","bibbaseid":"yi-peng-xiong-wang-dai-gao-xu-wang-etal-overviewonattackgraphgenerationandvisualizationtechnology-2013","role":"author","urls":{},"keyword":["Security;Visualization;Complexity theory;Communication networks;Risk analysis;Algorithm design and analysis;Databases;Attack Graph;Visualization;Attack Paths;Network Vulnerability Analysis"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/jxt2QguM78YnKN93X","dataSources":["Fc2aQ2NLdEjnGBfn9"],"keywords":["security;visualization;complexity theory;communication networks;risk analysis;algorithm design and analysis;databases;attack graph;visualization;attack paths;network vulnerability analysis"],"search_terms":["overview","attack","graph","generation","visualization","technology","yi","peng","xiong","wang","dai","gao","xu","wang","xu"],"title":"Overview on attack graph generation and visualization technology","year":2013}