Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
暂无分享,去创建一个
Branislav Bosanský | Viliam Lisý | Christopher Kiekintveld | Karel Durkota | V. Lisý | Christopher Kiekintveld | K. Durkota | B. Bosanský
[1] Sushil Jajodia,et al. Measuring Security Risk of Networks Using Attack Graphs , 2010, Int. J. Next Gener. Comput..
[2] Viliam Lisý,et al. Computing Optimal Policies for Attack Graphs with Action Failures and Costs , 2014, STAIRS.
[3] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[4] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[5] Russell Greiner,et al. Finding optimal satisficing strategies for and-or trees , 2006, Artif. Intell..
[6] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[7] J. Homer. A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks ∗ , 2009 .
[8] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.