Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Novel Attack Graph Posterior Inference Model Based on Bayesian Network"
written by Shaojun Zhang, Shanshan Song,
published by Journal of Information Security, Vol.2 No.1, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Time-Based Moving Target Defense Using Bayesian Attack Graph Analysis
IEEE …, 2023
[2] 基于期望收益率攻击图的网络风险评估研究
网络信息安全学报, 2022
[3] Application of Bayesian network in risk assessment for website deployment scenarios
Journal of Science and Technology …, 2021
[4] 소프트웨어 정의망에서 공격 그래프 기반의 침입감내 기술
한국통신학회논문지, 2021
[5] Umbra: a visual analysis approach for defense construction against inference attacks on sensitive information
… on Visualization and …, 2020
[6] A Risk Estimation Framework for Security Threats in Computer Networks
2020
[7] Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources
2020
[8] A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems.
ITASEC, 2019
[9] A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems⋆
CEUR Workshop Proceedings, 2019
[10] Analysis and Detection of Cyber Attack Processes targeting Smart Grids
2019
[11] A Bayesian network approach for the interpretation of cyber attacks to power systems
CEUR Workshop …, 2019
[12] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
Wuhan University Journal of Natural Sciences, 2018
[13] Decision Networks for Security Risk Assessment of Critical Infrastructures
ACM Transactions on Internet Technology (TOIT) - Special Issue on Artificial Intelligence for Secruity and Privacy and Regular Papers, 2018
[14] Planning Inspection of Sewer Pipelines Using Defect Based Risk Approach
2018
[15] Эксплуатационная безопасность. Моделирование реализации угроз атак потенциальным нарушителем
2017
[16] Вопросы корректности и универсальности подхода к моделированию надежностных параметров и характеристик угроз атак
2016
[17] A threat risk estimation model for computer network security
2016
[18] NoCGIN: A Gamma Interconnection Network as NoC Interconnect
International Journal of Computer Applications Foundation of Computer Science (FCS), NY, USA, 2016
[19] Year of Publication: 2017
2016
[20] Similarity measures and polymerization to identity threats in complex networks
2016
[21] A Probabilistic Approach to Detect and Prevent Bandwidth Depletion Attacks
International Journal of Computer Applications, 2016
[22] 面向复杂网络的威胁度量及聚合方法
2016
[23] Detecting Intrusions Using Social Network Analysis And Bayesian Network
2015
[24] 以社交網路分析整合貝氏網路偵測網路入侵
2015
[25] An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator
Appl. Math, 2014
[26] A Scenario Method to Automatically Assess ICT Risk
Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on. IEEE, 2014
[27] Automating the assessment of ICT risk
Journal of Information Security and Applications, 2014
[28] Assessing ICT risk through a Monte Carlo method
Environment Systems and Decisions, 2013
[29] A preliminary application of Generalized Fault Trees to security
International Conference on Security and Cryptography, SCITEPRESS, 2013
[30] Research on Predicting Attack Paths Based on Bayesian Inference
Information Technology Journal, 2013
[31] Моделирование атак в больших компьютерных сетях
Технические науки–от теории к практике, 2013
[32] Incremental learning of privacy-preserving Bayesian networks
Applied Soft Computing, 2013
[33] Research on attack graph based on attributes adjacncy matrix
2012
[34] Методика итерационного моделирования атак в больших компьютерных сетях
Труды СПИИРАН, 2012
[35] 基于属性邻接矩阵的攻击图表示方法研究
电子与信息学报, 2012
[36] Методы и средства моделирования атак в больших компьютерных сетях: состояние проблемы
Труды СПИИРАН, 2012
[37] Kotenko DI, Kotenko IV, Saenko IB Methods and tools for attack modeling in large computer networks: state of the problem.
DI Kotenko - proceedings.spiiras.nw.ru, 2012
[38] A review of bayesian networks and structure learning
Mathematica Applicanda, 2012
[39] A simulation-driven approach for assessing risks of complex systems
Proceedings of the 13th European Workshop on Dependable Computing. ACM, 2011
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top