"A Novel Attack Graph Posterior Inference Model Based on Bayesian Network"
written by Shaojun Zhang, Shanshan Song,
published by Journal of Information Security, Vol.2 No.1, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems⋆
CEUR Workshop Proceedings, 2019
[2] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
Wuhan University Journal of Natural Sciences, 2018
[3] Decision Networks for Security Risk Assessment of Critical Infrastructures
ACM Transactions on Internet Technology (TOIT) - Special Issue on Artificial Intelligence for Secruity and Privacy and Regular Papers, 2018
[4] Planning Inspection of Sewer Pipelines Using Defect Based Risk Approach
2018
[5] Эксплуатационная безопасность. Моделирование реализации угроз атак потенциальным нарушителем
2017
[6] Вопросы корректности и универсальности подхода к моделированию надежностных параметров и характеристик угроз атак
2016
[7] A threat risk estimation model for computer network security
2016
[8] NoCGIN: A Gamma Interconnection Network as NoC Interconnect
International Journal of Computer Applications Foundation of Computer Science (FCS), NY, USA, 2016
[9] Similarity measures and polymerization to identity threats in complex networks
2016
[10] A Probabilistic Approach to Detect and Prevent Bandwidth Depletion Attacks
International Journal of Computer Applications, 2016
[11] 面向复杂网络的威胁度量及聚合方法
2016
[12] An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator
Appl. Math, 2014
[13] A Scenario Method to Automatically Assess ICT Risk
Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on. IEEE, 2014
[14] Automating the assessment of ICT risk
Journal of Information Security and Applications, 2014
[15] Assessing ICT risk through a Monte Carlo method
Environment Systems and Decisions, 2013
[16] A preliminary application of Generalized Fault Trees to security
International Conference on Security and Cryptography, SCITEPRESS, 2013
[17] Research on Predicting Attack Paths Based on Bayesian Inference
Information Technology Journal, 2013
[18] Моделирование атак в больших компьютерных сетях
Технические науки–от теории к практике, 2013
[19] Incremental learning of privacy-preserving Bayesian networks
Applied Soft Computing, 2013
[20] Research on attack graph based on attributes adjacncy matrix
2012
[21] Методика итерационного моделирования атак в больших компьютерных сетях
Труды СПИИРАН, 2012
[22] 基于属性邻接矩阵的攻击图表示方法研究
电子与信息学报, 2012
[23] Методы и средства моделирования атак в больших компьютерных сетях: состояние проблемы
Труды СПИИРАН, 2012
[24] Kotenko DI, Kotenko IV, Saenko IB Methods and tools for attack modeling in large computer networks: state of the problem.
DI Kotenko - proceedings.spiiras.nw.ru, 2012
[25] A review of bayesian networks and structure learning
Mathematica Applicanda, 2012
[26] A simulation-driven approach for assessing risks of complex systems
Proceedings of the 13th European Workshop on Dependable Computing. ACM, 2011