Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
The use of network technologies has increased in recent years. Although the network is beneficial for individuals to work and live in, it does have security challenges that should be rectified. One of these issues is cyberattacks. The attack surface for hackers is growing as more devices are linked...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Tubitak
2024
|
Online Access: | http://eprints.utem.edu.my/id/eprint/28374/2/00896311220241156321571.pdf http://eprints.utem.edu.my/id/eprint/28374/ https://dergipark.org.tr/en/pub/ecjse/issue/87204/1375755 https://doi.org/10.31202/ecjse.1375755 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!