Attack graph-based security metrics: concept, taxonomy, challenges and open issues
Context: Security issues have increased recently because of the increased use of networking. The researchers have proposed many models, approaches, and models, for example, attack graphs. The attack graph model is a valuable tool for vulnerability analysis as well as for displaying all network paths...
Published in: | BIO Web of Conferences |
---|---|
Main Author: | Al-Araji Z.J.; Ahmad S.S.S.; Farhood H.M.; Mutlag A.A.; Al-Khaldee M.S. |
Format: | Conference paper |
Language: | English |
Published: |
EDP Sciences
2024
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85190577581&doi=10.1051%2fbioconf%2f20249700085&partnerID=40&md5=be19136e043e3e4170f590bf75d6cfec |
Similar Items
-
Taxonomy of C overflow vulnerabilities attack
by: Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
Published: (2011) -
EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES
by: Khan B.U.I.; Anwar F.; Rahman F.D.B.A.; Olanrewaju R.F.; Kiah M.L.B.M.; Rahman M.A.; Janin Z.
Published: (2022) -
An automobile security protocol: Side-channel security against timing and relay attacks
by: Isa M.A.M.; Hashim H.; Adnan S.F.S.; Marbukhari N.; Mohamed N.N.
Published: (2017) -
Towards A Taxonomy of Emerging Topics in Open Government Data: A Bibliometric Mapping Approach
by: Mohamad A.N.; Sylvester A.; Campbell-Meier J.
Published: (2022) -
Side-channel security on key exchange protocol: Timing and relay attacks
by: Isa M.A.M.; Hashim H.; Adnan S.F.S.; Mohamed N.N.; Alias Y.F.
Published: (2018)