نتایج جستجو برای: cost sensitive attack graph

تعداد نتایج: 915732  

Journal: :International Journal of Hybrid Information Technology 2017

Journal: :Engineering reports 2022

We present an approach to decision support in cybersecurity with respect cyber threats and stakeholders' requirements. situations which experts need take actions mitigate the risks, such as temporarily putting IT system out of operation, but consult them other stakeholders. propose a that uses mission decomposition model representing organization's functional security requirements on its infras...

Journal: :ACM Transactions on Knowledge Discovery from Data 2014

Journal: :International Journal of Computer Applications 2015

Journal: :Electronic Notes in Theoretical Computer Science 2003

Support vector machine (SVM) is a popular classification technique which classifies data using a max-margin separator hyperplane. The normal vector and bias of the mentioned hyperplane is determined by solving a quadratic model implies that SVM training confronts by an optimization problem. Among of the extensions of SVM, cost-sensitive scheme refers to a model with multiple costs which conside...

2013
Changwei Liu Anoop Singhal Duminda Wijesekera

Evidence graphs model network intrusion evidence and their dependen­ cies to help with network forensics analysis. With quantitative metrics, probabilistic evidence graphs provide a way to link probabilities associ­ ated with different attack paths with available evidence. Existing work in evidence graphs assumes that all available evidence forms a single evidence graph. We show how to merge di...

Journal: :Computational Intelligence 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید