메뉴 건너뛰기




Volumn 159, Issue 15, 2008, Pages 1889-1912

Two alternatives for handling preferences in qualitative choice logic

Author keywords

Inference relations; Normal form function; Qualitative choice logic

Indexed keywords

CORRELATION METHODS; DECISION MAKING; PROBLEM SOLVING; SEMANTICS;

EID: 44549085629     PISSN: 01650114     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.fss.2008.02.014     Document Type: Article
Times cited : (29)

References (38)
  • 1
    • 44549088300 scopus 로고    scopus 로고
    • J.P. Anderson, Computer Security Threat Monitoring and Surveillance, James P. Anderson Company, Fort Washington, PA, 1980.
    • J.P. Anderson, Computer Security Threat Monitoring and Surveillance, James P. Anderson Company, Fort Washington, PA, 1980.
  • 2
    • 44549085066 scopus 로고    scopus 로고
    • S. Benferhat, G. Brewka, D. Le Berre, On the relationship between qualitative choice logic and possibilistic logic, in: Proc. IPMU'04, Perugia, Italy, Juillet 2004, pp. 951-957.
    • S. Benferhat, G. Brewka, D. Le Berre, On the relationship between qualitative choice logic and possibilistic logic, in: Proc. IPMU'04, Perugia, Italy, Juillet 2004, pp. 951-957.
  • 3
    • 44549087656 scopus 로고    scopus 로고
    • S. Benferhat, D. Dubois, S. Kaci, H. Prade, Bipolar representation and fusion of preferences in the possibilistic logic framework, in: Proc. 8th Internat. Conf. on Principle of Knowledge Representation and Reasoning (KR02), Toulouse, France, 2002, pp. 158-169.
    • S. Benferhat, D. Dubois, S. Kaci, H. Prade, Bipolar representation and fusion of preferences in the possibilistic logic framework, in: Proc. 8th Internat. Conf. on Principle of Knowledge Representation and Reasoning (KR02), Toulouse, France, 2002, pp. 158-169.
  • 4
    • 0041629011 scopus 로고    scopus 로고
    • A logical representation and fusion of prioritized information based on guaranteed possibility measures: application to the encoding of distance-based merging for classical bases
    • Benferhat S., and Kaci S. A logical representation and fusion of prioritized information based on guaranteed possibility measures: application to the encoding of distance-based merging for classical bases. Artificial Intelligence 148 12 (2003) 291-333
    • (2003) Artificial Intelligence , vol.148 , Issue.12 , pp. 291-333
    • Benferhat, S.1    Kaci, S.2
  • 5
    • 44549083155 scopus 로고    scopus 로고
    • C. Boutilier, Towards a logic for qualitative decision theory, in: Proc. (KR-94) 1994, pp. 75-86.
    • C. Boutilier, Towards a logic for qualitative decision theory, in: Proc. (KR-94) 1994, pp. 75-86.
  • 6
    • 4344559610 scopus 로고    scopus 로고
    • CP-nets: a tool for representing and reasoning with conditional ceteris paribus preference statements
    • Boutilier C., Brafman R.I., Domshlak C., Hoos H.H., and Poole D. CP-nets: a tool for representing and reasoning with conditional ceteris paribus preference statements. J. Artificial Intelligence Res. 21 (2004) 135-191
    • (2004) J. Artificial Intelligence Res. , vol.21 , pp. 135-191
    • Boutilier, C.1    Brafman, R.I.2    Domshlak, C.3    Hoos, H.H.4    Poole, D.5
  • 7
    • 44549083567 scopus 로고    scopus 로고
    • C. Boutilier, R.I. Brafman, H.H. Hoos, D. Poole, Reasoning with conditional ceteris paribus preference statements, in: Proc. UAI-99, Stockholm, Sweden, 1999, pp. 71-80.
    • C. Boutilier, R.I. Brafman, H.H. Hoos, D. Poole, Reasoning with conditional ceteris paribus preference statements, in: Proc. UAI-99, Stockholm, Sweden, 1999, pp. 71-80.
  • 8
    • 0036926274 scopus 로고    scopus 로고
    • G. Brewka, Logic programming with ordered disjunction, in: Proc. 17th National Conf. on Artificial Intelligent (AAAI-02), Edmonton, Canada, 2002, pp. 100-105.
    • G. Brewka, Logic programming with ordered disjunction, in: Proc. 17th National Conf. on Artificial Intelligent (AAAI-02), Edmonton, Canada, 2002, pp. 100-105.
  • 10
    • 77952060555 scopus 로고    scopus 로고
    • G. Brewka, I. Niemela, T. Syrjanen, Implementing ordered disjunction using answer set solvers for normal programs, in: Proc. JELIA, Cosenza, Italy, Springer, Berlin, 2002, pp. 444-455.
    • G. Brewka, I. Niemela, T. Syrjanen, Implementing ordered disjunction using answer set solvers for normal programs, in: Proc. JELIA, Cosenza, Italy, Springer, Berlin, 2002, pp. 444-455.
  • 12
    • 84922794799 scopus 로고    scopus 로고
    • F. Cuppens, Managing alerts in a multi-intrusion detection environment, in: Proc. 17th Annu. Computer Security Applications Conference, December 2001, pp. 22-31.
    • F. Cuppens, Managing alerts in a multi-intrusion detection environment, in: Proc. 17th Annu. Computer Security Applications Conference, December 2001, pp. 22-31.
  • 13
    • 0036079912 scopus 로고    scopus 로고
    • F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, security and privacy, in: Proc. 2002 IEEE Symp., IEEE, New York, 2002, pp. 202-215.
    • F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, security and privacy, in: Proc. 2002 IEEE Symp., IEEE, New York, 2002, pp. 202-215.
  • 14
    • 84944201343 scopus 로고    scopus 로고
    • F. Cuppens, R. Ortalo, Lambda: a language to model a database for detection of attacks, in: Proc. of Recent Advances in Intrusion Detection, 3rd Internat. Symp., (RAID 2000), Toulouse, France, October 2000, pp. 197-216.
    • F. Cuppens, R. Ortalo, Lambda: a language to model a database for detection of attacks, in: Proc. of Recent Advances in Intrusion Detection, 3rd Internat. Symp., (RAID 2000), Toulouse, France, October 2000, pp. 197-216.
  • 15
    • 44549083539 scopus 로고    scopus 로고
    • D. Curry, H. Debar, Intrusion detection message exchange format data model and extensible markup language (XML) document type definition, draft-itetfidwg-idmef-xml-03.txt, February 2001.
    • D. Curry, H. Debar, Intrusion detection message exchange format data model and extensible markup language (XML) document type definition, draft-itetfidwg-idmef-xml-03.txt, February 2001.
  • 17
    • 44549084538 scopus 로고    scopus 로고
    • D. Dubois, S. Kaci, H. Prade, Bipolarity in reasoning and decision-an introduction. The case of the possibility theory framework, in: Proc. of Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference (IPMU'04), Perugia, Italy, Juillet 2004, pp. 959-966.
    • D. Dubois, S. Kaci, H. Prade, Bipolarity in reasoning and decision-an introduction. The case of the possibility theory framework, in: Proc. of Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference (IPMU'04), Perugia, Italy, Juillet 2004, pp. 959-966.
  • 19
    • 77953099209 scopus 로고    scopus 로고
    • D. Dubois, H. Prade, Bipolarity in possibilistic logic and fuzzy rules, in: Proc. of the 29th Conf. on Current Trends in Theory and Practice of Informatics (SOFSEM 2002), Milovy, Czech Republic, 22/11/2002-29/11/2002, Lecture Notes in Computer Science, Vol. 2540, Springer, Berlin, 2002, pp. 168-173.
    • D. Dubois, H. Prade, Bipolarity in possibilistic logic and fuzzy rules, in: Proc. of the 29th Conf. on Current Trends in Theory and Practice of Informatics (SOFSEM 2002), Milovy, Czech Republic, 22/11/2002-29/11/2002, Lecture Notes in Computer Science, Vol. 2540, Springer, Berlin, 2002, pp. 168-173.
  • 20
    • 0036090387 scopus 로고    scopus 로고
    • STATL: an attack language for state-based intrusion detection
    • Eckmann S.T., Vigna G., and Kemmerer R.A. STATL: an attack language for state-based intrusion detection. J. Comput. Security 10 1-2 (2002) 71-103
    • (2002) J. Comput. Security , vol.10 , Issue.1-2 , pp. 71-103
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 21
    • 0242443267 scopus 로고    scopus 로고
    • On the revision of preferences and rational inference processes
    • Freund M. On the revision of preferences and rational inference processes. Artificial Intelligence 152 (2004) 105-137
    • (2004) Artificial Intelligence , vol.152 , pp. 105-137
    • Freund, M.1
  • 22
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inform. System Security 6 4 (2003) 443-471
    • (2003) ACM Trans. Inform. System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 23
    • 44549088202 scopus 로고    scopus 로고
    • M. Lacroix, P. Lavency, Preferences, putting more knowledge into queries, in: Internat. Conf. on very large Data Bases, 1987, pp. 217-225.
    • M. Lacroix, P. Lavency, Preferences, putting more knowledge into queries, in: Internat. Conf. on very large Data Bases, 1987, pp. 217-225.
  • 24
    • 44549083388 scopus 로고    scopus 로고
    • J. Lang, Conditional desires and utilities: an alternative logical approach to qualitative decision theory, in: Proc. European Conf. on Artificial Intelligence (ECAI 2006), 1996, pp. 318-322.
    • J. Lang, Conditional desires and utilities: an alternative logical approach to qualitative decision theory, in: Proc. European Conf. on Artificial Intelligence (ECAI 2006), 1996, pp. 318-322.
  • 26
    • 44549087519 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory, DARPA intrusion detection evaluation data sets 〈http://www.ll.mit.edu/IST/ideval/data/data_index.html〉.
    • MIT Lincoln Laboratory, DARPA intrusion detection evaluation data sets 〈http://www.ll.mit.edu/IST/ideval/data/data_index.html〉.
  • 27
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts
    • ACM Press, Washington, DC, USA
    • Ning P., Cui Y., and Reeves D.S. Constructing attack scenarios through correlation of intrusion alerts. Proc. 9th ACM Conf. on Computer and Communication Security (November 2002), ACM Press, Washington, DC, USA 245-254
    • (2002) Proc. 9th ACM Conf. on Computer and Communication Security , pp. 245-254
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3
  • 28
    • 84958963784 scopus 로고    scopus 로고
    • P. Ning, Y. Cui, D.S. Reeves, Analyzing intensive intrusion alerts via correlation, in: Proc. 5th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2002), Lecture Notes in Computer Science, Vol. 2516, Zurich, Switzerland, October 2002, pp. 74-94.
    • P. Ning, Y. Cui, D.S. Reeves, Analyzing intensive intrusion alerts via correlation, in: Proc. 5th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2002), Lecture Notes in Computer Science, Vol. 2516, Zurich, Switzerland, October 2002, pp. 74-94.
  • 29
    • 84874814342 scopus 로고    scopus 로고
    • M.S. Pini, F. Rossi, K.B. Venable, S. Bistarelli, Bipolar preference problems: framework, properties and solving techniques, Selected Papers from 2006 ERCIM workshop on constraints (Lisbon, June 2006), Springer Lecture Notes in Artificial Intelligence, Vol. 4561, Springer, Berlin, pp. 78-92.
    • M.S. Pini, F. Rossi, K.B. Venable, S. Bistarelli, Bipolar preference problems: framework, properties and solving techniques, Selected Papers from 2006 ERCIM workshop on constraints (Lisbon, June 2006), Springer Lecture Notes in Artificial Intelligence, Vol. 4561, Springer, Berlin, pp. 78-92.
  • 31
  • 32
    • 0028555756 scopus 로고    scopus 로고
    • S.W. Tan, J. Pearl, Qualitative decision theory, in: Proc. AAAI-94, Seattle, 1994, pp. 928-933.
    • S.W. Tan, J. Pearl, Qualitative decision theory, in: Proc. AAAI-94, Seattle, 1994, pp. 928-933.
  • 33
    • 44549084283 scopus 로고    scopus 로고
    • S.W. Tan, J. Pearl, Specification and evaluation of preferences under uncertainty, in: KR'99, Bonn, 1994, pp. 530-539.
    • S.W. Tan, J. Pearl, Specification and evaluation of preferences under uncertainty, in: KR'99, Bonn, 1994, pp. 530-539.
  • 34
    • 0034593179 scopus 로고    scopus 로고
    • S.J. Templeton, K. Levitt, A require/provides model for computer attacks, in: Proc. 2000 Workshop on New Security Paradigms, February 2001.
    • S.J. Templeton, K. Levitt, A require/provides model for computer attacks, in: Proc. 2000 Workshop on New Security Paradigms, February 2001.
  • 35
    • 44549086410 scopus 로고    scopus 로고
    • A. Valdes, K. Skinner, Probabilistic alert correlation. in: Proc. 4th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2001), pp. 54-68.
    • A. Valdes, K. Skinner, Probabilistic alert correlation. in: Proc. 4th Internat. Symp. on Recent Advances in Intrusion Detection (RAID 2001), pp. 54-68.
  • 37
    • 44549083926 scopus 로고    scopus 로고
    • M.P. Wellman, J. Doyle, Preferential semantics for goals, in: Proc. of National Conf. on artificial Intelligence, Anaheim, 1991, pp. 698-703.
    • M.P. Wellman, J. Doyle, Preferential semantics for goals, in: Proc. of National Conf. on artificial Intelligence, Anaheim, 1991, pp. 698-703.
  • 38
    • 44549085296 scopus 로고    scopus 로고
    • 〈http://www.snort.org/〉.
    • 〈http://www.snort.org/〉.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.