Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes

被引:0
|
作者
Levner, Eugene [1 ]
Tsadikovich, Dmitry [2 ]
机构
[1] Faculty of Sciences, Holon Institute of Technology, Holon,58102, Israel
[2] Department of Management, Bar Ilan University, Ramat Gan,5290002, Israel
关键词
Consensus algorithm - Graph algorithms - Optimization algorithms;
D O I
10.3390/a17110504
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Cyber-Attack for BGP Systems Using CoPNet Model
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    [J]. 2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 10 - 15
  • [22] Cyber-attack Detection and Accommodation Algorithm for Energy Delivery Systems
    Mestha, Lalit K.
    Anubi, Olugbenga M.
    Abbaszadeh, Masoud
    [J]. 2017 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA 2017), 2017, : 1326 - 1331
  • [23] Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation
    Dong Zhang
    Chen Lv
    Tianci Yang
    Peng Hang
    [J]. Automotive Innovation, 2021, 4 : 262 - 273
  • [24] Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation
    Zhang, Dong
    Lv, Chen
    Yang, Tianci
    Hang, Peng
    [J]. AUTOMOTIVE INNOVATION, 2021, 4 (03) : 262 - 273
  • [25] Rapid Cyber-Attack Detection System with Low Probability of Missed Attack Warnings
    Vidanapathirana, Dushani
    Mohammad, Azeem
    Halgamuge, Malka N.
    [J]. 2022 IEEE 17TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2022, : 1423 - 1429
  • [26] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [27] Cyber-attack Detection Strategy Based on Distribution System State Estimation
    Huan Long
    Zhi Wu
    Chen Fang
    Wei Gu
    Xinchi Wei
    Huiyu Zhan
    [J]. Journal of Modern Power Systems and Clean Energy, 2020, 8 (04) : 669 - 678
  • [28] Optimization of Cyber-Attack Detection Using the Deep Learning Network
    Van Duong, Lai
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (07): : 159 - 163
  • [29] Cyber-attack risk low for medical devices
    Tse, Zion Tsz Ho
    Xu, Sheng
    Fung, Isaac Chun-Hai
    Wood, Bradford J.
    [J]. SCIENCE, 2015, 347 (6228) : 1323 - 1324
  • [30] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    [J]. 系统仿真技术, 2017, 13 (02) : 90 - 104