DAG-based attack and defense modeling: Don't miss the forest for the attack trees

被引:0
|
作者
机构
[1] [1,Kordy, Barbara
[2] Piètre-Cambacédès, Ludovic
[3] Schweitzer, Patrick
来源
Kordy, Barbara (basia.kordy@gmail.com) | 1600年 / Elsevier Ireland Ltd卷 / 13-14期
关键词
Network security - Forestry - Directed graphs;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Generative Adversarial Network Based Image-Scaling Attack and Defense Modeling
    Li, Junjian
    Chen, Honglong
    Li, Zhe
    Zhang, Anqing
    Wang, Xiaomeng
    Wang, Xingang
    Xia, Feng
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2025, 9 (01): : 861 - 873
  • [42] A Novel Network Delay Based Side-Channel Attack: Modeling and Defense
    Ling, Zhen
    Luo, Junzhou
    Zhang, Yang
    Yang, Ming
    Fu, Xinwen
    Yu, Wei
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2390 - 2398
  • [43] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [44] Exploiting attack-defense trees to find an optimal set of countermeasures
    Fila, Barbara
    Widel, Wojciech
    2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 395 - 410
  • [45] Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata
    Hansen, Rene Rydhof
    Jensen, Peter Gjol
    Larsen, Kim Guldstrand
    Legay, Axel
    Poulsen, Danny Bogsted
    GRAPHICAL MODELS FOR SECURITY, 2018, 10744 : 75 - 90
  • [46] Exploring the diversity of coronavirus in sewage during COVID-19 pandemic: Don't miss the forest for the trees
    Martinez-Puchol, Sandra
    Itarte, Marta
    Rusinol, Marta
    Fores, Eva
    Mejias-Molina, Cristina
    Andres, Cristina
    Anton, Andres
    Quer, Josep
    Abril, Josep F.
    Girones, Rosina
    Bofill-Mas, Silvia
    SCIENCE OF THE TOTAL ENVIRONMENT, 2021, 800
  • [47] Don't miss the forest for the trees: New recommendations for exploiting guilt and shame in self-control conflicts
    Li, Ying
    Jia, Lile
    SOCIAL AND PERSONALITY PSYCHOLOGY COMPASS, 2021, 15 (08)
  • [48] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling
    Liu, Zhijie
    Wang, Chongjun
    Chen, Shifu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
  • [49] Attack Vulnerabilities Analysis of Elgamal Elliptical Curve Based Stegocrypt Using Attack Trees
    Rabbani, Saqfi Ahmad
    Rahardjo, Budi
    Wuryandari, Aciek Ida
    2018 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2018, : 290 - 294
  • [50] AES power attack based on induced cache miss and countermeasure
    Bertoni, G
    Zaccaria, V
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 586 - 591