Network Threat Identification and Analysis Based on a State Transition Graph

With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is...

Full description

Bibliographic Details
Main Authors: Lv Huiying, Zhang Yuan, Wang Jie
Format: Article
Language:English
Published: Sciendo 2013-12-01
Series:Cybernetics and Information Technologies
Subjects:
Online Access:https://doi.org/10.2478/cait-2013-0037