Representation and analysis of coordinated attacks
暂无分享,去创建一个
[1] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[2] Nicholas Kushmerick,et al. An Algorithm for Probabilistic Least-Commitment Planning , 1994, AAAI.
[3] T. Dean,et al. Planning under uncertainty: structural assumptions and computational leverage , 1996 .
[4] David Carmel,et al. Opponent Modeling in Multi-Agent Systems , 1995, Adaption and Learning in Multi-Agent Systems.
[5] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[6] Somesh Jha,et al. Minimization and Reliability Analyses of Attack Graphs , 2002 .
[7] Tuomas Sandholm,et al. Reasoning about others: representing and processing infinite belief hierarchies , 2000, Proceedings Fourth International Conference on MultiAgent Systems.
[8] Ivan Serina,et al. LPG: A Planner Based on Local Search for Planning Graphs with Action Costs , 2002, AIPS.
[9] Maria Fox,et al. PDDL2.1: An Extension to PDDL for Expressing Temporal Planning Domains , 2003, J. Artif. Intell. Res..
[10] Jeannette M. Wing,et al. Survivability analysis of networked systems , 2001, ICSE 2001.
[11] Edmund M. Clarke,et al. Symbolic Model Checking: 10^20 States and Beyond , 1990, Inf. Comput..
[12] Fausto Giunchiglia,et al. Planning as Model Checking , 1999, ECP.
[13] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] Jeannette M. Wing. Survivability analysis of networked systems , 2000, FORTE.
[15] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[16] B. E. Eckbo,et al. Appendix , 1826, Epilepsy Research.
[17] Manuela M. Veloso,et al. OBDD-based Universal Planning for Synchronized Agents in Non-Deterministic Domains , 2000, J. Artif. Intell. Res..
[18] Ronen I. Brafman,et al. Partial-Order Planning with Concurrent Interacting Actions , 2011, J. Artif. Intell. Res..
[19] A. Householder,et al. Computer attack trends challenge Internet security , 2002 .
[20] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[21] Piergiorgio Bertoli,et al. MBP: a Model Based Planner , 2001 .
[22] Tal Garfinkel,et al. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools , 2003, NDSS.