作者: Paul Ammann , Duminda Wijesekera , Saket Kaushik
关键词: Computer science 、 Inference engine 、 Model checking 、 Scalability 、 Network security 、 Distributed computing 、 Theoretical computer science 、 Vulnerability 、 Attack tree 、 Exploit
摘要: … the attack graph. … vulnerability and hence simplify the analysis. Similarly, we can abstract a group of hosts with similar abstract vulnerabilities as a single node to simplify the attack graph…