A budgeted maximum multiple coverage model for cybersecurity planning and management
暂无分享,去创建一个
James R. Luedtke | Laura A. Albert | James Luedtke | Kaiyue Zheng | Eli Towle | Eli Towle | Kaiyue Zheng
[1] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[2] Nadya Bartol,et al. Supply Chain Risk Management Practices for Federal Information Systems and Organizations , 2015 .
[3] Jan Vondrák,et al. Optimal approximation for the submodular welfare problem in the value oracle model , 2008, STOC.
[4] Mark S. Daskin,et al. Network and Discrete Location: Models, Algorithms, and Applications, Second Edition , 2013 .
[5] Hadas Shachnai,et al. Approximations for Monotone and Nonmonotone Submodular Maximization with Knapsack Constraints , 2013, Math. Oper. Res..
[6] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[7] Matteo Fischetti,et al. Algorithms for the Set Covering Problem , 2000, Ann. Oper. Res..
[8] Sheldon Howard Jacobson,et al. Modeling aviation baggage screening security systems: a case study , 2003 .
[9] Jan Vondrák,et al. Maximizing a Monotone Submodular Function Subject to a Matroid Constraint , 2011, SIAM J. Comput..
[10] Senay Solak,et al. Measuring and Optimizing Cybersecurity Investments: A Quantitative Portfolio Approach , 2014 .
[11] Maxim Sviridenko,et al. A note on maximizing a submodular set function subject to a knapsack constraint , 2004, Oper. Res. Lett..
[12] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[13] Richard L. Church,et al. The maximal covering location problem , 1974 .
[14] Adam Shostack,et al. Threat Modeling: Designing for Security , 2014 .
[15] J. Goldberg. Operations Research Models for the Deployment of Emergency Services Vehicles , 2004 .
[16] Gio K. Kao,et al. Supply Chain Decision Analytics: Application and Case Study for Critical Infrastructure Security. , 2015 .
[17] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[18] Anna Nagurney,et al. Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability , 2017, Eur. J. Oper. Res..
[19] Sheldon Howard Jacobson,et al. Modeling and analyzing multiple station baggage screening security system performance , 2005 .
[20] Clare Brindley,et al. Supply chain risk , 2004 .
[21] Maxim Sviridenko,et al. Pipage Rounding: A New Method of Constructing Algorithms with Proven Performance Guarantee , 2004, J. Comb. Optim..
[22] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[23] J. Beasley. A lagrangian heuristic for set‐covering problems , 1990 .
[24] James R. Clapper. Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, Senate Select Committee on Intelligence, James R. Clapper, Director of National Intelligence, March 12, 2013 , 2013 .
[25] Christodoulos A. Floudas. Generalized Benders Decomposition , 2009, Encyclopedia of Optimization.
[26] Fredrick M. McCrory,et al. Supply Chain Risk Management: The Challenge in a Digital World. , 2015 .
[27] Roy Schwartz,et al. Comparing Apples and Oranges: Query Trade-off in Submodular Maximization , 2017, Math. Oper. Res..
[28] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[29] Alexander Shapiro,et al. The Sample Average Approximation Method for Stochastic Discrete Optimization , 2002, SIAM J. Optim..
[30] Theodore T. Allen,et al. Data-Driven Cyber-Vulnerability Maintenance Policies , 2014 .
[31] Samir Khuller,et al. The Budgeted Maximum Coverage Problem , 1999, Inf. Process. Lett..
[32] David P. Morton,et al. Prioritization via Stochastic Optimization , 2015, Manag. Sci..
[33] Mark S. Daskin,et al. Network and Discrete Location: Models, Algorithms and Applications , 1995 .
[34] Gilbert Laporte,et al. Ambulance location and relocation models , 2000, Eur. J. Oper. Res..
[35] Stephen M. Hess,et al. Prioritizing Project Selection , 2009 .
[36] Jan Vondrák,et al. Fast algorithms for maximizing submodular functions , 2014, SODA.
[37] John T. Michalski,et al. Supply Chain Security Decision Analytics: Macro Analysis. , 2015 .
[38] Amit Kumar,et al. Maximum Coverage Problem with Group Budget Constraints and Applications , 2004, APPROX-RANDOM.
[39] Sanjeeb Dash,et al. Strengthened Benders Cuts for Stochastic Integer Programs with Continuous Recourse , 2017, INFORMS J. Comput..
[40] Anna Nagurney,et al. A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability , 2015 .