Cyclic Bayesian attack graphs: a systematic computational approach

I Matthews, J Mace, S Soudjani… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
exact values of these marginal probabilities (eg, [14]). Given that the structure of the … The
input to the algorithm is the graph with local probabilities. The pop(int) function used in the …

Information security assessment of wireless sensor networks based on bayesian attack graphs

YY Chen, B Xu, J Long - Journal of Intelligent & Fuzzy Systems, 2021 - content.iospress.com
… network systems, and the results are more objective and accurate. … 4) P is the collection of
local condition probability … on the attack probabilities, so that the node attack probabilities can …

Bayesian attack graphs for platform virtualized infrastructures in clouds

B Asvija, R Eswari, MB Bijoy - Journal of Information Security and …, 2020 - Elsevier
probabilities at the attack graph nodes. Mun̴oz-González et al. [7] have described employing
exact inference techniques to analyze BAGs… networks can be factored by local conditional …

Structural learning techniques for Bayesian attack graphs in cyber physical power systems

A Sahu, K Davis - 2021 IEEE Texas Power and Energy …, 2021 - ieeexplore.ieee.org
… in [19], where the attacker’s probability to reach a security state … to infer the structure of attack
graphs locally in a small network. … , “Exact inference techniques for the analysis of bayesian

Adversarial attacks on graph classifiers via bayesian optimisation

X Wan, H Kenlay, R Ru, A Blaas… - Advances in Neural …, 2021 - proceedings.neurips.cc
… log-likelihood. Overall, the WL routines scales as O(Hm) and … exist) and an accurate
estimation of such high dimensional … to attack graph classifiers using Bayesian optimisation. We …

Distributed grid state estimation under cyber attacks using optimal filter and Bayesian approach

MM Rana, R Bo, A Abdelhadi - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
estimation, each agent in the power network is locally … the cyber attack and noises leads
to an accurate estimation result. … the variational Bayesian learning method [45], the likelihood

Risk assessment method of IoT host based on attack graph

H Yang, H Yuan, L Zhang - Mobile Networks and Applications, 2023 - Springer
… target node probability based on the Bayesian attack graph, … article, the attack probability of
the host in the attack graph, … paper are more differential and more accurate and reasonable. …

GGNB: Graph-based Gaussian naive Bayes intrusion detection system for CAN bus

R Islam, MK Devnath, MD Samad… - Vehicular …, 2022 - Elsevier
… , in an attacked graph, the PR values of attacked vertices are … of graphs, we have the probability
of attacked and attack free … Similar to the other data set [1], we analyze precision, recall, …

[HTML][HTML] Modeling and risk analysis of chemical terrorist attacks: A Bayesian network method

R Zhu, X Hu, X Li, H Ye, N Jia - International journal of environmental …, 2020 - mdpi.com
… evidence theory to analyse the probability distribution of the “… precise method is used to
calculate the risk value, it can better support decision-making. For future research, this Bayesian

Deepag: Attack graph construction and threats prediction with bi-directional deep learning

T Li, Y Jiang, C Lin, MS Obaidat… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… 8] [9] applied Bayesian Network to reveal the zero-day attack … and analyze the impact of
different values of probability … LSTM tends to make increasingly accurate predictions with the …