Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model (Q342516): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Partitioning procedures for solving mixed-variables programming problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interdicting a Nuclear-Weapons Project / rank
 
Normal rank
Property / cites work
 
Property / cites work: Error Detecting and Error Correcting Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shortest-path network interdiction / rank
 
Normal rank
Property / cites work
 
Property / cites work: DAG-based attack and defense modeling: don't miss the forest for the attack trees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Methods for removing links in a network to minimize the spread of infections / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimizing a stochastic maximum-reliability path / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing a border under asymmetric information / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simplified Algorithm for Obtaining Approximate Solutions to Zero-One Programming Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic network interdiction / rank
 
Normal rank

Latest revision as of 23:02, 12 July 2024

scientific article
Language Label Description Also known as
English
Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model
scientific article

    Statements

    Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model (English)
    0 references
    0 references
    0 references
    0 references
    17 November 2016
    0 references
    attack graph
    0 references
    interdiction
    0 references
    bi-level
    0 references
    mixed-integer-programming
    0 references
    attacker-defender
    0 references
    cyber-security
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references