• Citations Per Year
Learn More
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how(More)
Attack graphs are important tools for analyzing network security vulnerabilities. Recently, the generation method of attack graphs is a hot topic to the security researchers. As previous works encounter the scalability problem and inaccurate input information problem, we propose a novel method to automatic construction of attack graphs based on probability.(More)
OBJECTIVE To investigate the findings of adult moyamoya disease (MD) of different types on plain CT, brain perfusion CT (CTP) and brain CT angiography (CTA). MATERIALS AND METHODS A total of 48 patients with ischemic MD and hemorrhagic MD were recruited into present study, and findings were collected from plain CT, CTP and CTA. RESULTS The incidence of(More)
  • 1