Skip to content
MyTheses
  • Feedback
  • Book Bag: 0 items (Full)
  • HOME
  • MYTHESES
  • BLOG
  • AI ASSISTANT
  • INSTITUTION
  • GUIDE & TUTORIAL
  • CONTACT
    • English
    • Français
    • 日本語
    • 中文(简体)
    • 中文(繁體)
    • اللغة العربية
    • हिंदी
Advanced
  • Attack graph construction for...
  • Cite this
  • Text this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Add to Book Bag Remove from Book Bag
  • Permanent link

QR Code

Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics

The use of network technologies has increased in recent years. Although the network is beneficial for individuals to work and live in, it does have security challenges that should be rectified. One of these issues is cyberattacks. The attack surface for hackers is growing as more devices are linked...

Full description

Bibliographic Details
Main Author: Al-Araji, Zaid Jasim Mohammed
Format: Thesis
Language:English
English
Published: 2023
Subjects:
T Technology (General)
TK Electrical engineering. Electronics Nuclear engineering
Online Access:http://eprints.utem.edu.my/id/eprint/27699/1/Attack%20graph%20construction%20for%20enhancing%20intrusion%20prediction%20based%20on%20vulnerabilities%20metrics.pdf
http://eprints.utem.edu.my/id/eprint/27699/2/Attack%20graph%20construction%20for%20enhancing%20intrusion%20prediction%20based%20on%20vulnerabilities%20metrics.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://eprints.utem.edu.my/id/eprint/27699/1/Attack%20graph%20construction%20for%20enhancing%20intrusion%20prediction%20based%20on%20vulnerabilities%20metrics.pdf
http://eprints.utem.edu.my/id/eprint/27699/2/Attack%20graph%20construction%20for%20enhancing%20intrusion%20prediction%20based%20on%20vulnerabilities%20metrics.pdf

Similar Items

  • Enhanced fast attack detection technique for network intrusion detection system
    by: Abdollah, Mohd Faizal
    Published: (2009)
  • Accuracy and quickness criterion-based driving skill metric for human adaptive mechatronics system
    by: Aujih, Ahmad Bukhari
    Published: (2015)
  • Securing passive optical network against signal injection attack
    by: Al-Hinai, Salim Mohammed Abdullah
    Published: (2019)
  • Significant Feature Identification Mechanism For Ipv6 In Enhancing Intrusion Detection System
    by: Muslim, Zulkiflee
    Published: (2017)
  • Web log cleaning algorithm for intrusion detection
    by: Ong, Yew Chuan
    Published: (2013)

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs