Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis
Vol. 22, No. 5, pp. 1079-1090,
Oct.
2012
10.13089/JKIISC.2012.22.5.1079, Full Text:
Keywords: Network Security, Attack Graph, System Vulnerability Evaluation
Abstract Statistics
Cite this article
10.13089/JKIISC.2012.22.5.1079, Full Text:
Keywords: Network Security, Attack Graph, System Vulnerability Evaluation
Abstract Statistics
Cite this article
[IEEE Style]
J. H. Kim and H. K. Kim, "Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis," Journal of The Korea Institute of Information Security and Cryptology, vol. 22, no. 5, pp. 1079-1090, 2012. DOI: 10.13089/JKIISC.2012.22.5.1079.
[ACM Style]
Ji Hong Kim and Huy Kang Kim. 2012. Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis. Journal of The Korea Institute of Information Security and Cryptology, 22, 5, (2012), 1079-1090. DOI: 10.13089/JKIISC.2012.22.5.1079.