[1]
|
Time-Based Moving Target Defense Using Bayesian Attack Graph Analysis
|
|
IEEE …,
2023 |
|
|
[2]
|
基于期望收益率攻击图的网络风险评估研究
|
|
网络信息安全学报,
2022 |
|
|
[3]
|
Application of Bayesian network in risk assessment for website deployment scenarios
|
|
Journal of Science and Technology …,
2021 |
|
|
[4]
|
소프트웨어 정의망에서 공격 그래프 기반의 침입감내 기술
|
|
한국통신학회논문지,
2021 |
|
|
[5]
|
Umbra: a visual analysis approach for defense construction against inference attacks on sensitive information
|
|
… on Visualization and …,
2020 |
|
|
[6]
|
A Risk Estimation Framework for Security Threats in Computer Networks
|
|
2020 |
|
|
[7]
|
Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources
|
|
2020 |
|
|
[8]
|
A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems.
|
|
ITASEC,
2019 |
|
|
[9]
|
A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems⋆
|
|
CEUR Workshop Proceedings,
2019 |
|
|
[10]
|
Analysis and Detection of Cyber Attack Processes targeting Smart Grids
|
|
2019 |
|
|
[11]
|
A Bayesian network approach for the interpretation of cyber attacks to power systems
|
|
CEUR Workshop …,
2019 |
|
|
[12]
|
Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
|
|
Wuhan University Journal of Natural Sciences,
2018 |
|
|
[13]
|
Decision Networks for Security Risk Assessment of Critical Infrastructures
|
|
ACM Transactions on Internet Technology (TOIT) - Special Issue on Artificial Intelligence for Secruity and Privacy and Regular Papers,
2018 |
|
|
[14]
|
Planning Inspection of Sewer Pipelines Using Defect Based Risk Approach
|
|
2018 |
|
|
[15]
|
Эксплуатационная безопасность. Моделирование реализации угроз атак потенциальным нарушителем
|
|
2017 |
|
|
[16]
|
Вопросы корректности и универсальности подхода к моделированию надежностных параметров и характеристик угроз атак
|
|
2016 |
|
|
[17]
|
A threat risk estimation model for computer network security
|
|
2016 |
|
|
[18]
|
NoCGIN: A Gamma Interconnection Network as NoC Interconnect
|
|
International Journal of Computer Applications Foundation of Computer Science (FCS), NY, USA,
2016 |
|
|
[19]
|
Year of Publication: 2017
|
|
2016 |
|
|
[20]
|
Similarity measures and polymerization to identity threats in complex networks
|
|
2016 |
|
|
[21]
|
A Probabilistic Approach to Detect and Prevent Bandwidth Depletion Attacks
|
|
International Journal of Computer Applications,
2016 |
|
|
[22]
|
面向复杂网络的威胁度量及聚合方法
|
|
2016 |
|
|
[23]
|
Detecting Intrusions Using Social Network Analysis And Bayesian Network
|
|
2015 |
|
|
[24]
|
以社交網路分析整合貝氏網路偵測網路入侵
|
|
2015 |
|
|
[25]
|
An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator
|
|
Appl. Math,
2014 |
|
|
[26]
|
A Scenario Method to Automatically Assess ICT Risk
|
|
Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on. IEEE,
2014 |
|
|
[27]
|
Automating the assessment of ICT risk
|
|
Journal of Information Security and Applications,
2014 |
|
|
[28]
|
Assessing ICT risk through a Monte Carlo method
|
|
Environment Systems and Decisions,
2013 |
|
|
[29]
|
A preliminary application of Generalized Fault Trees to security
|
|
International Conference on Security and Cryptography, SCITEPRESS,
2013 |
|
|
[30]
|
Research on Predicting Attack Paths Based on Bayesian Inference
|
|
Information Technology Journal,
2013 |
|
|
[31]
|
Моделирование атак в больших компьютерных сетях
|
|
Технические науки–от теории к практике,
2013 |
|
|
[32]
|
Incremental learning of privacy-preserving Bayesian networks
|
|
Applied Soft Computing,
2013 |
|
|
[33]
|
Research on attack graph based on attributes adjacncy matrix
|
|
2012 |
|
|
[34]
|
Методика итерационного моделирования атак в больших компьютерных сетях
|
|
Труды СПИИРАН,
2012 |
|
|
[35]
|
基于属性邻接矩阵的攻击图表示方法研究
|
|
电子与信息学报,
2012 |
|
|
[36]
|
Методы и средства моделирования атак в больших компьютерных сетях: состояние проблемы
|
|
Труды СПИИРАН,
2012 |
|
|
[37]
|
Kotenko DI, Kotenko IV, Saenko IB Methods and tools for attack modeling in large computer networks: state of the problem.
|
|
DI Kotenko - proceedings.spiiras.nw.ru,
2012 |
|
|
[38]
|
A review of bayesian networks and structure learning
|
|
Mathematica Applicanda,
2012 |
|
|
[39]
|
A simulation-driven approach for assessing risks of complex systems
|
|
Proceedings of the 13th European Workshop on Dependable Computing. ACM,
2011 |
|
|