نتایج جستجو برای: cost sensitive attack graph

تعداد نتایج: 915732  

Journal: :IEEE Transactions on Neural Networks and Learning Systems 2017

Journal: :Computational Statistics & Data Analysis 2021

Many real-world classification problems come with costs which can vary for different types of misclassification. It is thus important to develop cost-sensitive classifiers minimize the total misclassification cost. Although binary have been well-studied, solving multicategory still challenging. A popular approach address this issue construct K functions a K-class problem and remove redundancy b...

Journal: :Computer Communications 2006
Lingyu Wang Steven Noel Sushil Jajodia

In defending one’s network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given c...

Journal: :Journal of the Royal Society, Interface 2015
Boris Podobnik Davor Horvatic T. Lipic Matjaz Perc Javier M. Buldú H. Eugene Stanley

Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functi...

Introduction: Segmentation of brain images especially from magnetic resonance imaging (MRI) is an essential requirement in medical imaging since the tissues, edges, and boundaries between them are ambiguous and difficult to detect, due to the proximity of the brightness levels of the images. Material and Methods: In this paper, the graph-base...

Journal: :Int. J. Adv. Comp. Techn. 2010
Om Pal Peeyush Jain Sudhansu Goyal Zia Saquib Bernard L. Menezes

At present it is almost impossible to detect zero day attack with help of supervised anomaly detection methods. Unsupervised techniques also have the drawback of low detection rate in spite of detection of zero day attacks. Using combination of both unsupervised and supervised methods, promising detection results can be produced. In this paper we present a new sequence based graph support techn...

In this study a simple, highly sensitive, and selective electrochemical method was developed for determination of the low concentration curcumin (CUR) using a poly(vanillin-co-caffeic acid) p(Van-CA) modified platinum electrode. Electrode modification was carried out electrochemically with cyclic voltammetry (CV) method. For this purpose; a solution of 6 mM vanillin (Van) and 6 mM caff...

Journal: :CoRR 2005
Gianni Tedesco Uwe Aickelin

­ Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, is difficult to analyze. Intrusion alert correlation is the task of automating some of this analysis by grouping related alerts together. Attack graphs provide an intuitive model for such analys...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید