시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법
Vol. 22, No. 5, pp. 1079-1090,
10월.
2012
10.13089/JKIISC.2012.22.5.1079,
Full Text:
Keywords: Network Security, Attack Graph, System Vulnerability Evaluation
Abstract Statistics
Cite this article


Keywords: Network Security, Attack Graph, System Vulnerability Evaluation
Abstract Statistics
Cite this article
[IEEE Style]
J. H. Kim and H. K. Kim, "Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis," Journal of The Korea Institute of Information Security and Cryptology, vol. 22, no. 5, pp. 1079-1090, 2012. DOI: 10.13089/JKIISC.2012.22.5.1079.
[ACM Style]
Ji Hong Kim and Huy Kang Kim. 2012. Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis. Journal of The Korea Institute of Information Security and Cryptology, 22, 5, (2012), 1079-1090. DOI: 10.13089/JKIISC.2012.22.5.1079.