Pages that link to "Item:Q342516"
From MaRDI portal
The following pages link to Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model (Q342516):
Displaying 9 items.
- Methods for removing links in a network to minimize the spread of infections (Q342308) (← links)
- A mixed-integer programming approach for locating jamming devices in a flow-jamming attack (Q1652633) (← links)
- An exact approach for the \(r\)-interdiction covering problem with fortification (Q1725826) (← links)
- Radio communications interdiction problem under deterministic and probabilistic jamming (Q1738838) (← links)
- An integer linear programming formulation for removing nodes in a network to minimize the spread of influenza virus infections (Q1756351) (← links)
- Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs (Q1999634) (← links)
- A review of attack graph and attack tree visual syntax in cyber security (Q2197794) (← links)
- A bi-level model and memetic algorithm for arc interdiction location-routing problem (Q2244003) (← links)
- An exact approach for the r-interdiction median problem with fortification (Q5242354) (← links)