Bayesian network models in cyber security: a systematic review
Abstract Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber
security especially due to their capability to overcome data limitations. This is also …
security especially due to their capability to overcome data limitations. This is also …
Bayesian decision network-based security risk management framework
M Khosravi-Farmad, A Ghaemi-Bafghi - Journal of Network and Systems …, 2020 - Springer
Network security risk management is comprised of several essential processes, namely risk
assessment, risk mitigation and risk validation and monitoring, which should be done …
assessment, risk mitigation and risk validation and monitoring, which should be done …
Unknown vulnerability risk assessment based on directed graph models: a survey
W He, H Li, J Li - IEEE Access, 2019 - ieeexplore.ieee.org
Nowadays, vulnerability attacks occur frequently. Due to the information asymmetry between
attackers and defenders, vulnerabilities can be divided into known and unknown. Existing …
attackers and defenders, vulnerabilities can be divided into known and unknown. Existing …
Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph
M Javorník, M Husák - Engineering Reports, 2022 - Wiley Online Library
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …
and stakeholders' requirements. We approach situations in which cybersecurity experts …
Aggregation of security metrics for decision making: a reference architecture
Existing security technologies play a significant role in protecting enterprise systems but they
are no longer enough on their own given the number of successful cyberattacks against …
are no longer enough on their own given the number of successful cyberattacks against …
Bayesian Decision Network–Based Optimal Selection of Hardening Strategies for Power Distribution Systems
Power distribution systems, composed of wood poles and wires, are susceptible to damage
caused by strong winds during hurricanes or winter storms. Power outages induced by failed …
caused by strong winds during hurricanes or winter storms. Power outages induced by failed …
Information security risk assessment of smartphones using Bayesian networks
K Herland - 2015 - aaltodoc.aalto.fi
The amount of smartphones in use has grown exponentially during the last decade, and with
this growth, users have become vulnerable to a new realm of information security threats …
this growth, users have become vulnerable to a new realm of information security threats …
A threat risk estimation model for computer network security
R Rezaee, AG Bafghi… - 2016 6th International …, 2016 - ieeexplore.ieee.org
Risk analysis of security threats in computer networks is one of the most challenging fields in
network management. Security risk analysis is usually done by security experts. Although …
network management. Security risk analysis is usually done by security experts. Although …
Risk-based intrusion response management in IDS using Bayesian decision networks
M Khosravi-Farmad, AA Ramaki… - 2015 5th International …, 2015 - ieeexplore.ieee.org
Nowadays, from information security perspective, detection methods are not enough solely.
Intrusion Detection and Response Systems (IDRS), as a proactive solution, continuously …
Intrusion Detection and Response Systems (IDRS), as a proactive solution, continuously …
A risk estimation framework for security threats in computer networks
R Rezaee, A Ghaemi Bafghi - Journal of Computing and Security, 2020 - jcomsec.ui.ac.ir
In security risk management of computer networks, some challenges are more serious in
large networks. Specifying and estimating risks is largely dependent on the knowledge of …
large networks. Specifying and estimating risks is largely dependent on the knowledge of …