Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
The use of network technologies has increased in recent years. Although the network is beneficial for individuals to work and live in, it does have security challenges that should be rectified. One of these issues is cyberattacks. The attack surface for hackers is growing as more devices are linked...
Saved in:
Main Authors: | Al-Araji, Zaid J., Mutlag, Ammar Awad, Syed Ahmad, Sharifah Sakinah |
---|---|
Format: | Article |
Language: | English |
Published: |
Tubitak
2024
|
Online Access: | http://eprints.utem.edu.my/id/eprint/28374/2/00896311220241156321571.pdf http://eprints.utem.edu.my/id/eprint/28374/ https://dergipark.org.tr/en/pub/ecjse/issue/87204/1375755 https://doi.org/10.31202/ecjse.1375755 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Attack prediction to enhance attack path discovery using improved attack graph
by: Al-Araji, Zaid Jasim, et al.
Published: (2022) -
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
by: Al-Araji, Zaid Jasim Mohammed
Published: (2023) -
Generating topologies using edges and vertices in graphs and some applications
by: Abdu, Khalid Abdulkalek
Published: (2018) -
On graphs without multicliqual edges
by: Lim, Chong Keang, et al.
Published: (1981) -
End-to-end supermask pruning: Learning to prune image captioning models
by: Tan, Jia Huei, et al.
Published: (2022)