Cybersecurity knowledge graph embedding method for security assessment of information systems under complex attacks

Xie Yushun, Ma Jie, Zhang Haodi, Li Jianming, Wang Zeshi, Jiang Hao, Wang shuai

Journal of Cybersecurity ›› 2025, Vol. 3 ›› Issue (5) : 48-60.

PDF(786 KB)
PDF(786 KB)
Journal of Cybersecurity ›› 2025, Vol. 3 ›› Issue (5) : 48-60. DOI: 10.20172/j.issn.2097-3136.250505
Special Topic on Security Evaluation of Network Information Systems

Cybersecurity knowledge graph embedding method for security assessment of information systems under complex attacks

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

QR code of this article

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}[J]. {{journal.qiKanMingCheng_EN}}, 2025, 3(5): 48-60 https://doi.org/10.20172/j.issn.2097-3136.250505

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(786 KB)

Accesses

Citation

Detail

Sections
Recommended

/