Performance analysis of automated attack graph generation software

The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the success of this technology has created a need for software to aid in network v...

Full description

Bibliographic Details
Main Author: Cullum, James J.
Other Authors: Irvine, Cynthia
Format: Others
Published: Monterey, California. Naval Postgraduate School 2012
Subjects:
Online Access:http://hdl.handle.net/10945/2515