نتایج جستجو برای: cost sensitive attack graph

تعداد نتایج: 915732  

2016
Bhaskar Ramasubramanian M. A. Rajan Girish Chandra

The resilience of cyberphysical systems (CPS) to denial of service (DoS) and integrity attacks is studied. The CPS is modeled as a linear structured system, and its resilience to various attack scenarios is interpreted in a graph theoretical framework. The structural resilience of the CPS to DoS and integrity attacks is characterized in terms of unmatched vertices in maximum matchings of the bi...

Journal: :Journal of The Royal Society Interface 2015

2014
Changwei Liu Anoop Singhal Duminda Wijesekera

Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use the information obtained from security events to construct an attack scenario and build an evidence graph. To achieve the accuracy and completeness of the evidence graph, we use Prolog inductive and abductive reasoning t...

ابراهیمی, الهام, تیموری, مهدی, علوی نیا, سید محمد,

Background and Objectives: Diabetic patients are always at risk of hypertension. In this paper, the main goal was to design a native cost sensitive model for the diagnosis of hypertension among diabetics considering the prior probabilities. Methods: In this paper, we tried to design a cost sensitive model for the diagnosis of hypertension in diabetic patients, considering the distribution of...

Journal: :Comput. Sci. Inf. Syst. 2016
Kun Bi Dezhi Han Jun Wang

An attack graph depicts multiple-step attack and provides a description of system security vulnerabilities. It illustrates critical information necessary to identify potential weaknesses and areas for enhanced defense. Attack graphs include multiple attack paths, which are a focus for further detailed analysis and risk mitigation. Considering that different vulnerabilities have different probab...

Journal: :Computers & Mathematics with Applications 1997

Journal: :International Journal of Intelligent Systems 2023

Graph neural networks (GNNs) have shown significant performance in various practical applications due to their strong learning capabilities. Backdoor attacks are a type of attack that can produce hidden on machine models. GNNs take backdoor datasets as input an adversary-specified output poisoned data but perform normally clean data, which grave implications for applications. under-researched t...

2005
Dang Nguyen Kwangjo Kim

A transitive signature scheme allows a signer to publish a graph in an authenticated and cost-saving manner. The resulting authenticated graph is indeed the transitive closure of the graph constructed by edges which are explicitly signed by the signer. A property of the transitive signature scheme enables such scenario is called composability which means that by knowing signatures on two edges ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید