Articles with "attack path" as a keyword



Photo by bladeoftree from unsplash

An Improved Attack Path Discovery Algorithm Through Compact Graph Planning

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2915091

Abstract: Attack path discovery plays an important role in protecting network infrastructure. Unfortunately, previous attack path discovery algorithms are difficult for applying in reality because of the high computational complexity problem. To achieve effective attack path… read more here.

Keywords: path discovery; path; attack path; graph ... See more keywords
Photo from wikipedia

Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2018.2821095

Abstract: Enforcing a variety of security measures (such as intrusion detection systems, and so on) can provide a certain level of protection to computer networks. However, such security practices often fall short in face of zero-day… read more here.

Keywords: attack paths; attack path; day attack; day ... See more keywords