MulVAL
From MaRDI portal
Software:29596
swMATH17743MaRDI QIDQ29596FDOQ29596
Author name not available (Why is that?)
Cited In (5)
- Remodeling Vulnerability Information
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Efficient defense decision-making approach for multistep attacks based on the attack graph and game theory
- A review of attack graph and attack tree visual syntax in cyber security
- New insights into approaches to evaluating intention and path for network multistep attacks
This page was built for software: MulVAL