A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Correlating intrusion events and building attack scenarios through attack graph distances , 2004, 20th Annual Computer Security Applications Conference.
[2] Deborah A. Frincke,et al. Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net , 2007, Comput. Networks.
[3] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[4] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[5] R. Cunningham,et al. Validating and Restoring Defense in Depth Using Attack Graphs , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[6] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[7] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[8] Jianhua Li,et al. Using attack graphs and intrusion evidences to extrapolate network security state , 2009, 2009 Fourth International Conference on Communications and Networking in China.
[9] Felix Salfner,et al. Modeling Event-driven Time Series with Generalized Hidden Semi-Markov Models , 2006 .
[10] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[11] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[12] Peng Ning,et al. Reasoning about complementary intrusion evidence , 2004, 20th Annual Computer Security Applications Conference.
[13] Daniel Zelterman,et al. Bayesian Artificial Intelligence , 2005, Technometrics.
[14] Zoubin Ghahramani,et al. An Introduction to Hidden Markov Models and Bayesian Networks , 2001, Int. J. Pattern Recognit. Artif. Intell..
[15] Finn V. Jensen,et al. Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.
[16] Jianhua Li,et al. Building network attack graph for alert causal correlation , 2008, Comput. Secur..
[17] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[18] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.