Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering Systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Requirements Engineering Model in Designing Complex Systems

This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...

متن کامل

Requirements Engineering Model in Designing Complex Systems

This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Automatic task graph generation techniques

We present a model of parallel computation, the parameterized task graph, which is a compact, problem size independent, representation of some frequently used directed acylic task graphs. Techniques automating the construction of such a representation, starting from an annotated sequential program are proposed. We show how to represent the computational load for each node and the communication ...

متن کامل

Allergy Attack Against Automatic Signature Generation

Research in systems that automatically generate signatures to filter out zero-day worm instances at perimeter defense has received a lot of attention recently. While a well known problem with these systems is that the signatures generated are usually not very useful against polymorphic worms, we shall in this paper investigate a different, and potentially more serious problem facing automatic s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Processes

سال: 2019

ISSN: 2227-9717

DOI: 10.3390/pr7110787