Research Article
Quantitative Method for Network Security Situation Based on Attack Prediction
Table 11
Feature comparisons among our method and others.
| Types | Situation fusion factors | Dynamic attack-defense network | Attack time quantification | Time complexity | Environmental information | Attacker | Defender |
| [10] | √ | √ | × | No | Yes | | [11] | √ | √ | × | No | Yes | — | [16] | √ | √ | × | No | Yes | | [17] | √ | √ | × | No | No | | [18] | √ | √ | √ | Yes | No | | [22] | √ | √ | √ | Yes | No | — | [27] | √ | √ | √ | No | No | | Our method | √ | √ | √ | Yes | Yes | |
|
|
Remark. “—” indicates not reported.
|