Author of the publication

Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.

, , , , , , , and . CloudNet, page 398-402. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complex Scenario-Oriented Fine-Grained Visual Classification Platform., , , , , , , , , and . MMSP, page 1. IEEE, (2022)Cross-Layer Feature based Multi-Granularity Visual Classification., , , , and . VCIP, page 1-5. IEEE, (2022)LightGuard: A Lightweight Malicious Traffic Detection Method for Internet of Things., , , , and . IEEE Internet Things J., 11 (17): 28566-28577 (September 2024)A Probabilistic Expression System for Fingerprint Identification Findings Based on Stability., , , , , and . IC-NIDC, page 435-439. IEEE, (2021)LBfT: Learning Bayesian Network Structures from Text in Autonomous Typhoon Response Systems., , , , , , , and . AAMAS, page 1914-1916. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), (2022)Learning a Typhoon Bayesian Network Structure from Natural Language Reports., , , , , and . IFIP TC12 ICIS, volume 659 of IFIP Advances in Information and Communication Technology, page 174-182. Springer, (2022)ATPT: Automate Typhoon Contingency Plan Generation from Text., , , , , , , and . AAMAS, page 1788-1790. ACM, (2021)Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation., , , , , , , and . CloudNet, page 398-402. IEEE, (2023)