Author of the publication

Aggregating vulnerability metrics in enterprise networks using attack graphs.

, , , , , , and . J. Comput. Secur., 21 (4): 561-597 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static detection of Android malware based on improved random forest algorithm., , , and . ISI, page 200. IEEE, (2017)Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks., , , and . CNCERT, volume 1506 of Communications in Computer and Information Science, page 143-156. Springer, (2021)Android Malware Detection Based on a Hybrid Deep Learning Model., , , , and . Secur. Commun. Networks, (2020)Design and Implementation of a Cloud Based Forensic Science Information System Model., and . CSC, page 140-145. IEEE Computer Society, (2013)Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks., , and . J. Supercomput., 80 (7): 9935-9960 (May 2024)Suggestions to digital forensics in Cloud computing ERA., , , and . IC-NIDC, page 540-544. IEEE, (2012)EM-YOLO: An X-ray Prohibited-Item-Detection Method Based on Edge and Material Information Fusion., , , and . Sensors, 23 (20): 8555 (October 2023)A Data Enhancement Algorithm for DDoS Attacks Using IoT., , , , and . Sensors, 23 (17): 7496 (September 2023)IoT Device Identification Using Directional Packet Length Sequences and 1D-CNN., , and . Sensors, 22 (21): 8337 (2022)Aggregating vulnerability metrics in enterprise networks using attack graphs., , , , , , and . J. Comput. Secur., 21 (4): 561-597 (2013)