Abstract | ||
---|---|---|
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical representation, often referred to as an attack graph (AG). Instead of deriving AGs based on system vulnerabilities, this work advocates ... |
Year | DOI | Venue |
---|---|---|
2022 | 10.1109/TDSC.2021.3117348 | IEEE Transactions on Dependable and Secure Computing |
Keywords | DocType | Volume |
Security,Pipelines,Probabilistic logic,Learning automata,Testing,Special issues and sections,Markov processes | Journal | 19 |
Issue | ISSN | Citations |
2 | 1545-5971 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Azqa Nadeem | 1 | 1 | 1.36 |
Sicco Verwer | 2 | 282 | 31.26 |
Stephen Moskal | 3 | 5 | 3.73 |
Shanchieh Jay Yang | 4 | 0 | 0.68 |