V Lisý, R Píbil - Intelligence and Security Informatics: Pacific Asia …, 2013 - Springer
Attack graphs are a formalism for capturing the most important ways to compromise a system. They are used for evaluating risks and designing appropriate countermeasures …
J Iša, Z Reitermanová, O Sýkora - … International Conference on …, 2009 - ieeexplore.ieee.org
The General Solution DAGs (GS-DAGs) are a method used to solve the Unconstrained Influence Diagrams (UIDs). In the first part of this paper, we determine the strict upper bound …
he current development of computer networks brings convenience and comfort to the users. Unfortunately, the computer networks are increasingly attacked, which poses security threats …
The current development of computer networks brings convenience and comfort to the users. Unfortunately, the computer networks are increasingly attacked, which poses security …
J Iša, Z Reitermanová, O Sýkora - … Conference on Current Trends in Theory …, 2012 - Springer
In this paper, we deal with an enhanced problem of cost-sensitive classification, where not only the cost of misclassification needs to be minimized, but also the total cost of tests and …