메뉴 건너뛰기




Volumn , Issue , 2005, Pages 12-21

Course of action generation for cyber security using classical planning

Author keywords

[No Author keywords available]

Indexed keywords

CLASSICAL PLANNING; COURSE OF ACTION; CYBER SECURITY; DOCUMENT CONTROL SYSTEMS; EXTENDED SEQUENCES; INITIAL STATE; NETWORK VULNERABILITY; STATE OF THE ART;

EID: 84890260789     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (125)

References (15)
  • 2
    • 0004027897 scopus 로고    scopus 로고
    • Pddl2.1: An extension to pddl for expressing temporal planning domains
    • Fox, M. and Long, D. 2002. Pddl2.1: An extension to pddl for expressing temporal planning domains. Technical report, University of Durham.
    • (2002) Technical Report, University of Durham
    • Fox, M.1    Long, D.2
  • 4
    • 0032050560 scopus 로고    scopus 로고
    • State-variable planning under structural restrictions: Algorithms and complexity
    • Jonsson, P. and Backstrom, C. 1998. State-variable planning under structural restrictions: Algorithms and complexity. Artificial Intelligence 100(1-2): 125-176.
    • (1998) Artificial Intelligence , vol.100 , Issue.1-2 , pp. 125-176
    • Jonsson, P.1    Backstrom, C.2
  • 5
    • 9444221204 scopus 로고    scopus 로고
    • Compiling causal theories to successor state axioms and strips-like systems
    • Lin, F. 2003. Compiling causal theories to successor state axioms and strips-like systems. Journal of Artificial Intelligence Research 19:279-314.
    • (2003) Journal of Artificial Intelligence Research , vol.19 , pp. 279-314
    • Lin, F.1
  • 12
    • 17744373483 scopus 로고    scopus 로고
    • Pittsburgh, PA Ph.D. Dissertation, Computer Science Department
    • Sheyner, O. 2004. Scenario Graphs and Attack Graphs. Ph.D. Dissertation, Computer Science Department, Pittsburgh, PA.
    • (2004) Scenario Graphs and Attack Graphs
    • Sheyner, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.