Bayesian network models in cyber security: a systematic review

S Chockalingam, W Pieters, A Teixeira… - Secure IT Systems: 22nd …, 2017 - Springer
Abstract Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber
security especially due to their capability to overcome data limitations. This is also …

Bayesian decision network-based security risk management framework

M Khosravi-Farmad, A Ghaemi-Bafghi - Journal of Network and Systems …, 2020 - Springer
Network security risk management is comprised of several essential processes, namely risk
assessment, risk mitigation and risk validation and monitoring, which should be done …

Unknown vulnerability risk assessment based on directed graph models: a survey

W He, H Li, J Li - IEEE Access, 2019 - ieeexplore.ieee.org
Nowadays, vulnerability attacks occur frequently. Due to the information asymmetry between
attackers and defenders, vulnerabilities can be divided into known and unknown. Existing …

Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph

M Javorník, M Husák - Engineering Reports, 2022 - Wiley Online Library
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …

Aggregation of security metrics for decision making: a reference architecture

Y Ahmed, S Naqvi, M Josephs - … of the 12th European Conference on …, 2018 - dl.acm.org
Existing security technologies play a significant role in protecting enterprise systems but they
are no longer enough on their own given the number of successful cyberattacks against …

Bayesian Decision Network–Based Optimal Selection of Hardening Strategies for Power Distribution Systems

Q Lu, W Zhang, W Hughes… - ASCE-ASME Journal of …, 2022 - ascelibrary.org
Power distribution systems, composed of wood poles and wires, are susceptible to damage
caused by strong winds during hurricanes or winter storms. Power outages induced by failed …

Information security risk assessment of smartphones using Bayesian networks

K Herland - 2015 - aaltodoc.aalto.fi
The amount of smartphones in use has grown exponentially during the last decade, and with
this growth, users have become vulnerable to a new realm of information security threats …

A threat risk estimation model for computer network security

R Rezaee, AG Bafghi… - 2016 6th International …, 2016 - ieeexplore.ieee.org
Risk analysis of security threats in computer networks is one of the most challenging fields in
network management. Security risk analysis is usually done by security experts. Although …

Risk-based intrusion response management in IDS using Bayesian decision networks

M Khosravi-Farmad, AA Ramaki… - 2015 5th International …, 2015 - ieeexplore.ieee.org
Nowadays, from information security perspective, detection methods are not enough solely.
Intrusion Detection and Response Systems (IDRS), as a proactive solution, continuously …

A risk estimation framework for security threats in computer networks

R Rezaee, A Ghaemi Bafghi - Journal of Computing and Security, 2020 - jcomsec.ui.ac.ir
In security risk management of computer networks, some challenges are more serious in
large networks. Specifying and estimating risks is largely dependent on the knowledge of …