Case Studies of Network Defense with Attack Graph Games
暂无分享,去创建一个
Branislav Bosanský | Michal Pechoucek | Viliam Lisý | Christopher Kiekintveld | Karel Durkota | V. Lisý | Christopher Kiekintveld | M. Pechoucek | K. Durkota | B. Bosanský
[1] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[2] Branislav Bosanský,et al. Approximate Solutions for Attack Graph Games with Imperfect Information , 2015, GameSec.
[3] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[4] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[5] Teodor Sommestad,et al. An empirical test of the accuracy of an attack graph analysis tool , 2015, Inf. Comput. Secur..
[6] Branislav Bosanský,et al. Optimal Network Security Hardening Using Attack Graph Games , 2015, IJCAI.
[7] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[8] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .