Overview on attack graph generation and visualization technology. Yi, S., Peng, Y., Xiong, Q., Wang, T., Dai, Z., Gao, H., Xu, J., Wang, J., & Xu, L. In 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID), pages 1-6, 2013.
doi  bibtex   
@inproceedings{Yi2013,
  author    = {Yi, Shengwei and Peng, Yong and Xiong, Qi and Wang, Ting and Dai, Zhonghua and Gao, Haihui and Xu, Junfeng and Wang, Jiteng and Xu, Lijuan},
  booktitle = {2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)},
  title     = {Overview on attack graph generation and visualization technology},
  year      = {2013},
  volume    = {},
  number    = {},
  pages     = {1-6},
  keywords  = {Security;Visualization;Complexity theory;Communication networks;Risk analysis;Algorithm design and analysis;Databases;Attack Graph;Visualization;Attack Paths;Network Vulnerability Analysis},
  doi       = {10.1109/ICASID.2013.6825274}
}

Downloads: 0