Abstract: Most of existing path finding problems focused on searching a path with the minimum cost, such as shortest-path length and shortest travel time. In this paper, we consider a new path finding ...
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Abstract: An attack graph is a method used to enumerate the possible paths that an attacker can take in the organizational network. MulVAL is a known open-source framework used to automatically ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results