Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering Systems
نویسندگان
چکیده
منابع مشابه
Requirements Engineering Model in Designing Complex Systems
This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...
متن کاملRequirements Engineering Model in Designing Complex Systems
This research tends to development of the requirements elicitation methodology with regard to operational nature and hierarchical analysis for complex systems and also, regarding available technologies. This methodology applies Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP) to ensure traceability of planned qualitative and quantitative data from requirements to available te...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملAutomatic task graph generation techniques
We present a model of parallel computation, the parameterized task graph, which is a compact, problem size independent, representation of some frequently used directed acylic task graphs. Techniques automating the construction of such a representation, starting from an annotated sequential program are proposed. We show how to represent the computational load for each node and the communication ...
متن کاملAllergy Attack Against Automatic Signature Generation
Research in systems that automatically generate signatures to filter out zero-day worm instances at perimeter defense has received a lot of attention recently. While a well known problem with these systems is that the signatures generated are usually not very useful against polymorphic worms, we shall in this paper investigate a different, and potentially more serious problem facing automatic s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Processes
سال: 2019
ISSN: 2227-9717
DOI: 10.3390/pr7110787