A dependency graph formalism for the dynamic defense of cyber networks
暂无分享,去创建一个
Demosthenis Teneketzis | Erik Miehling | Mohammad Rasouli | D. Teneketzis | Erik Miehling | M. Rasouli
[1] Joel Veness,et al. Monte-Carlo Planning in Large POMDPs , 2010, NIPS.
[2] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[3] William H. Sanders,et al. Ieee Transactions on Parallel and Distributed Systems Rre: a Game-theoretic Intrusion Response and Recovery Engine , 2022 .
[4] O. Patrick Kreidl,et al. Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.
[5] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[6] Sherif Abdelwahed,et al. A Probabilistic Approach to Autonomic Security Management , 2016, 2016 IEEE International Conference on Autonomic Computing (ICAC).
[7] Pravin Varaiya,et al. Stochastic Systems: Estimation, Identification, and Adaptive Control , 1986 .