Implement edge pruning to enhance attack graph generation using the naïve approach algorithm

The use of network technologies has increased in recent years. Although the network is beneficial for individuals to work and live in, it does have security challenges that should be rectified. One of these issues is cyberattacks. The attack surface for hackers is growing as more devices are linked...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Araji, Zaid J., Mutlag, Ammar Awad, Syed Ahmad, Sharifah Sakinah
Format: Article
Language:English
Published: Tubitak 2024
Online Access:http://eprints.utem.edu.my/id/eprint/28374/2/00896311220241156321571.pdf
http://eprints.utem.edu.my/id/eprint/28374/
https://dergipark.org.tr/en/pub/ecjse/issue/87204/1375755
https://doi.org/10.31202/ecjse.1375755
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items