메뉴 건너뛰기




Volumn , Issue , 2003, Pages 43-51

Representation and analysis of coordinated attacks

Author keywords

Adversary modelling; Attack graph; Attack plan; Coordinated attack; Model checking

Indexed keywords

ALGORITHMS; INTELLIGENT AGENTS; LAGRANGE MULTIPLIERS; MATHEMATICAL MODELS; SOFTWARE AGENTS; SYNCHRONIZATION;

EID: 2642532056     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1035429.1035434     Document Type: Conference Paper
Times cited : (35)

References (26)
  • 3
    • 0013580273 scopus 로고    scopus 로고
    • Planning under uncertainty: Structural assumptions and computational leverage
    • M. Ghallab and A. Milani, editors, IOS Press (Amsterdam)
    • C. Boutilier, T. Dean, and S. Hanks. Planning under uncertainty: Structural assumptions and computational leverage. In M. Ghallab and A. Milani, editors, New Directions in AI Planning, pages 157-172. IOS Press (Amsterdam), 1996.
    • (1996) New Directions in AI Planning , pp. 157-172
    • Boutilier, C.1    Dean, T.2    Hanks, S.3
  • 6
    • 2642545776 scopus 로고    scopus 로고
    • Opponent modeling in multi-agent systems
    • G. Weiß and S. Sen, editors, Springer-Verlag: Heidelberg, Germany
    • D. Carmel and S. Markovitch. Opponent modeling in multi-agent systems. In G. Weiß and S. Sen, editors, Adaptation and Learning in Multi-Agent Systems, pages 40-52. Springer-Verlag: Heidelberg, Germany, 1996.
    • (1996) Adaptation and Learning in Multi-agent Systems , pp. 40-52
    • Carmel, D.1    Markovitch, S.2
  • 10
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in in system call interposition based security tools
    • February
    • T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In Proc. Network and Distributed Systems Security Symposium, February 2003.
    • (2003) Proc. Network and Distributed Systems Security Symposium
    • Garfinkel, T.1
  • 14
    • 0000235433 scopus 로고    scopus 로고
    • Obdd-based universal planning for synchronized agents in non-deterministic domains
    • R. Jensen and M. Veloso. Obdd-based universal planning for synchronized agents in non-deterministic domains. Journal of Artificial Intelligence Research, 13:189-226, 2000.
    • (2000) Journal of Artificial Intelligence Research , vol.13 , pp. 189-226
    • Jensen, R.1    Veloso, M.2
  • 21
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (p-best)
    • Oakland, California
    • U. Lindqvist and P. Porras. Detecting computer and network misuse through the production-based expert system toolset (p-best). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, 1999.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.2
  • 23
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, December, 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.