Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks

JH Cho, R Chen, PG Feng - IEEE Transactions on Reliability, 2010 - ieeexplore.ieee.org
For mission-oriented mobile group systems designed to continue mission execution in
hostile environments in the presence of security attacks, it is critical to properly deploy …

Attribute evaluation on attack trees with incomplete information

A Buldas, O Gadyatskaya, A Lenin, S Mauw… - Computers & …, 2020 - Elsevier
Attack trees are considered a useful tool for security modelling because they support
qualitative as well as quantitative analysis. The quantitative approach is based on values …

Security analysis of SITAR intrusion tolerance system

D Wang, BB Madan, KS Trivedi - … of the 2003 ACM workshop on …, 2003 - dl.acm.org
Security is an important QoS attribute for characterizing intrusion tolerant computing
systems. Frequently however, the security of computing systems is assessed in a qualitative …

Automated adaptive intrusion containment in systems of interacting services

YS Wu, B Foo, YC Mao, S Bagchi, EH Spafford - Computer networks, 2007 - Elsevier
Large scale distributed systems typically have interactions among different services that
create an avenue for propagation of a failure from one service to another. The failures being …

Cost evaluation for intrusion response using dependency graphs

N Kheir, H Debar, N Cuppens-Boulahia… - … on network and …, 2009 - ieeexplore.ieee.org
The cost evaluation for attacks and/or responses (further called security incidents) in an IT
system is a challenging issue. The high rate of service dependencies increases this …

Pre-processing methods of data mining

A Saleem, KH Asif, A Ali, SM Awan… - 2014 IEEE/ACM 7th …, 2014 - ieeexplore.ieee.org
Data generation, handling and its processing have emerged as the most reliable source of
understanding and discovery of new facts, knowledge and products in the world of natural …

Attack path analysis for cyber physical systems

G Kavallieratos, S Katsikas - … , and ADIoT, Guildford, UK, September 14–18 …, 2020 - Springer
The identification and analysis of potential paths that an adversary may exploit to attack
Cyber Physical Systems comprising sub-systems enables the comprehensive …

Employing attack graphs for intrusion detection

F Capobianco, R George, K Huang, T Jaeger… - Proceedings of the new …, 2019 - dl.acm.org
Intrusion detection systems are a commonly deployed defense that examines network traffic,
host operations, or both to detect attacks. However, more attacks bypass IDS defenses each …

Hypothesizing and reasoning about attacks missed by intrusion detection systems

P Ning, D Xu - ACM Transactions on Information and System Security …, 2004 - dl.acm.org
Several alert correlation methods have been proposed over the past several years to
construct high-level attack scenarios from low-level intrusion alerts reported by intrusion …

[引用][C] 面向网络系统的脆弱性利用成本估算模型

冯萍慧, 连一峰, 戴英侠, 李闻, 张颖君 - 计算机学报, 2006