Attack plan recognition and prediction using causal networks
暂无分享,去创建一个
Wenke Lee | Xinzhou Qin | Wenke Lee | X. Qin
[1] Wenke Lee,et al. Discovering Novel Attack Strategies from INFOSEC Alerts , 2004, ESORICS.
[2] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[3] Robert P. Goldman,et al. A Bayesian Model of Plan Recognition , 1993, Artif. Intell..
[4] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[5] Eric Bauer,et al. Update Rules for Parameter Estimation in Bayesian Networks , 1997, UAI.
[6] Robert P. Goldman,et al. A Probabilistic Model of Plan Recognition , 1991, AAAI.
[7] Sandra Carberry,et al. Incorporating Default Inferences Into Plan Recognition , 1990, AAAI.
[8] Stephen Taylor,et al. Validation of Sensor Alert Correlators , 2003, IEEE Secur. Priv..
[9] N. S. Sridharan,et al. The Plan Recognition Problem: An Intersection of Psychology and Artificial Intelligence , 1978, Artif. Intell..
[10] Michael P. Wellman,et al. Planning and Control , 1991 .
[11] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[12] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[13] Ulf Lindqvist,et al. Modeling multistep cyber attacks for scenario recognition , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[14] Robert P. Goldman,et al. Plan recognition in intrusion detection systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[15] Hervé Debar,et al. Correlation of Intrusion Symptoms: An Application of Chronicles , 2003, RAID.
[16] Robert P. Goldman,et al. Information modeling for intrusion report aggregation , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[17] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[18] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[19] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[20] Drew McDermott,et al. Introduction to artificial intelligence , 1986, Addison-Wesley series in computer science.
[21] Henry A. Kautz,et al. Generalized Plan Recognition , 1986, AAAI.
[22] C. Granger. Investigating Causal Relations by Econometric Models and Cross-Spectral Methods , 1969 .
[23] Ingrid Zukerman,et al. Bayesian Models for Keyhole Plan Recognition in an Adventure Game , 2004, User Modeling and User-Adapted Interaction.
[24] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[25] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[26] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[27] C. Granger. Investigating causal relations by econometric models and cross-spectral methods , 1969 .
[28] C. Raymond Perrault,et al. Beyond Question-Answering. , 1981 .