Attack-Defense Utility Quantification And Security Risk Assessment
暂无分享,去创建一个
[1] Khurram Shahzad,et al. P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language , 2015, IEEE Trans. Dependable Secur. Comput..
[2] A. M. Fink,et al. Equilibrium in a stochastic $n$-person game , 1964 .
[3] Xiaobin Tan,et al. Network Security Situation Awareness Approach Based on Markov Game Model: Network Security Situation Awareness Approach Based on Markov Game Model , 2011 .
[4] Mathias Ekstedt,et al. Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[5] Mathias Ekstedt,et al. A probabilistic relational model for security risk analysis , 2010, Comput. Secur..
[6] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] Peng Liu,et al. Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[8] Ibrahim Sogukpinar,et al. Scalable risk assessment method for cloud computing using game theory (CCRAM) , 2015, Comput. Stand. Interfaces.
[9] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[10] Sushil Jajodia,et al. Cyber Deception , 2016, Springer International Publishing.
[11] Wei Jiang,et al. Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model: Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model , 2009 .