A Probabilistic Framework for Security Scenarios with Dependent Actions
暂无分享,去创建一个
[1] Paul D. Seymour,et al. Graph minors. I. Excluding a forest , 1983, J. Comb. Theory, Ser. B.
[2] Frank van Harmelen,et al. Handbook of Knowledge Representation , 2008, Handbook of Knowledge Representation.
[3] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[4] Barbara Kordy,et al. Quantitative Questions on Attack-Defense Trees , 2012, ICISC.
[5] Hans L. Bodlaender,et al. A Partial k-Arboretum of Graphs with Bounded Treewidth , 1998, Theor. Comput. Sci..
[6] L. Zadeh. Fuzzy sets as a basis for a theory of possibility , 1999 .
[7] Barbara Kordy,et al. ADTool: Security Analysis with Attack-Defense Trees , 2013, QEST.
[8] Roman Barták,et al. Constraint Processing , 2009, Encyclopedia of Artificial Intelligence.
[9] Daniel Kahneman,et al. Probabilistic reasoning , 1993 .
[10] Alessandra Bagnato,et al. Attribute Decoration of Attack-Defense Trees , 2012, Int. J. Secur. Softw. Eng..
[11] Daesung Kwon,et al. Information Security and Cryptology – ICISC 2012 , 2012, Lecture Notes in Computer Science.
[12] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[13] Barbara Kordy,et al. Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.
[14] Marcin Junczys-Dowmunt,et al. SyMGiza++: Symmetrized Word Alignment Models for Statistical Machine Translation , 2011, SIIS.
[15] Marc Pouly,et al. Nenok - a Software Architecture for Generic Inference , 2010, Int. J. Artif. Intell. Tools.
[16] Derek G. Corneil,et al. Complexity of finding embeddings in a k -tree , 1987 .
[17] Jane Hillston,et al. PALOMA: A Process Algebra for Located Markovian Agents , 2014, QEST.
[18] Prakash P. Shenoy,et al. Valuation-based systems: a framework for managing uncertainty in expert systems , 1992 .
[19] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[20] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[21] Wenke Lee,et al. Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.
[22] Jürg Kohlas. Information algebras - generic structures for inference , 2003, Discrete mathematics and theoretical computer science.
[23] L. Zadeh,et al. Fuzzy Logic for the Management of Uncertainty , 1992 .
[24] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[25] Barbara Kordy,et al. DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..
[26] Barbara Kordy,et al. Attack-defense trees , 2014, J. Log. Comput..
[27] L. Nordstrom,et al. Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams , 2009, IEEE Transactions on Power Delivery.
[28] Nic Wilson,et al. Semiring induced valuation algebras: Exact and approximate local computation algorithms , 2008, Artif. Intell..
[29] Rina Dechter,et al. Bucket Elimination: A Unifying Framework for Reasoning , 1999, Artif. Intell..
[30] Judea Pearl,et al. Chapter 2 – BAYESIAN INFERENCE , 1988 .
[31] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[32] Marc Pouly,et al. Generic Inference: A Unifying Theory for Automated Reasoning , 2011 .
[33] Barbara Kordy,et al. Computational Aspects of Attack-Defense Trees , 2011, SIIS.
[34] Seungjoo Kim,et al. Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.
[35] Lingyu Wang,et al. Measuring Network Security Using Bayesian Network-Based Attack Graphs , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[36] Jan Jürjens,et al. Verifying Cryptographic Code in C: Some Experience and the Csec Challenge , 2011, Formal Aspects in Security and Trust.
[37] Robert Lagerström,et al. Extended Influence Diagram Generation , 2007, IESA.