Probabilistic reasoning with graphical security models
From MaRDI portal
Publication:1671722
DOI10.1016/J.INS.2016.01.010zbMath1395.68114OpenAlexW2233280931MaRDI QIDQ1671722
Patrick Schweitzer, Barbara Kordy, Marc Pouly
Publication date: 7 September 2018
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2016.01.010
Bayesian networkssemiring theoryattack treesattack-defense treesdependent actionsprobabilistic analysis of security
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Graph minors. I. Excluding a forest
- Fuzzy sets as a basis for a theory of possibility
- A partial k-arboretum of graphs with bounded treewidth
- Bucket elimination: A unifying framework for reasoning
- Semiring induced valuation algebras: exact and approximate local computation algorithms
- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
- Generic Inference
- Complexity of Finding Embeddings in a k-Tree
- Quantitative Questions on Attack–Defense Trees
- Attack-defense trees
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Probabilistic reasoning with graphical security models