Genetic Approximations for the Failure-Free Security Games
暂无分享,去创建一个
[1] Jan Willemson,et al. Attacker Profiling in Quantitative Security Assessment Based on Attack Trees , 2014, NordSec.
[2] Ahto Buldas,et al. Limiting Adversarial Budget in Quantitative Security Assessment , 2014, GameSec.
[3] Jan Willemson,et al. Serial Model for Attack Tree Computations , 2009, ICISC.
[4] Jan Willemson,et al. Computing Exact Outcomes of Multi-parameter Attack Trees , 2008, OTM Conferences.
[5] Ahto Buldas,et al. New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees , 2013, GameSec.
[6] Ahto Buldas,et al. Upper Bounds for Adversaries' Utility in Attack Trees , 2012, GameSec.
[7] Lalit M. Patnaik,et al. Adaptive probabilities of crossover and mutation in genetic algorithms , 1994, IEEE Trans. Syst. Man Cybern..
[8] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[9] Jan Willemson,et al. On Fast and Approximate Attack Tree Computations , 2010, ISPEC.
[10] Jan Willemson,et al. Rational Choice of Security Measures Via Multi-parameter Attack Trees , 2006, CRITIS.
[11] W E Vesely,et al. Fault Tree Handbook , 1987 .