-
1
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In ACM Conference on Computer and Communications Security, pages 217-224, 2002.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
4
-
-
84890260789
-
Course of action generation for cyber security using classical planning
-
Mark Boddy, Johnathan Gohde, Tom Haigh, and Steven Harp. Course of action generation for cyber security using classical planning. In International Conference on Automated Planning and Scheduling, pages 12-21, 2005.
-
(2005)
International Conference on Automated Planning and Scheduling
, pp. 12-21
-
-
Boddy, M.1
Gohde, J.2
Haigh, T.3
Harp, S.4
-
5
-
-
69949102998
-
Interdicting a nuclear-weapons project
-
Gerald G. Brown, W. Matthew Carlyle, Robert C. Harney, Eric M. Skroch, and R. Kevin Wood. Interdicting a nuclear-weapons project. Operations Research, 57(4): 866-877, 2009.
-
(2009)
Operations Research
, vol.57
, Issue.4
, pp. 866-877
-
-
Brown, G.G.1
Matthew Carlyle, W.2
Harney, R.C.3
Skroch, E.M.4
Kevin Wood, R.5
-
6
-
-
33749015487
-
Temporal planning using subgoal partitioning and resolution in SGPlan
-
Yixin Chen, Benjamin W. Wah, and Chih wei Hsu. Temporal planning using subgoal partitioning and resolution in SGPlan. Journal of Artificial Intelligence Research, 26: 323-369, 2006.
-
(2006)
Journal of Artificial Intelligence Research
, vol.26
, pp. 323-369
-
-
Chen, Y.1
Wah, B.W.2
Hsu, C.W.3
-
8
-
-
0141444512
-
Optimal interdiction policy for a flow network
-
P.M. Ghare, D.C. Montgomery, and W.C. Turner. Optimal interdiction policy for a flow network. Naval Research Logistics Quarterly, 18(1): 37-45, 1971.
-
(1971)
Naval Research Logistics Quarterly
, vol.18
, Issue.1
, pp. 37-45
-
-
Ghare, P.M.1
Montgomery, D.C.2
Turner, W.C.3
-
11
-
-
84899919065
-
Playing games with security: An efficient exact algorithm for Bayesian stackelberg games
-
Praveen Paruchuri, Jonathan P. Pearce, Janusz Marecki, Milind Tambe, Fernando Ordóñez, and Sarit Kraus. Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In Proceedings of the Seventh International Conference on Autonomous Agents and Multiagent Systems, pages 895-902, 2008.
-
(2008)
Proceedings of the Seventh International Conference on Autonomous Agents and Multiagent Systems
, pp. 895-902
-
-
Paruchuri, P.1
Pearce, J.P.2
Marecki, J.3
Tambe, M.4
Ordóñez, F.5
Kraus, S.6
-
13
-
-
84899442804
-
Guards - Game theoretic security allocation on a national scale
-
James Pita, Milind Tambe, Chris Kiekintveld, Shane Cullen, and Erin Steigerwald. Guards - game theoretic security allocation on a national scale. In Tenth International Conferenceon Autonomous Agents and Multiagent Systems, pages 37-44, 2011.
-
(2011)
Tenth International Conferenceon Autonomous Agents and Multiagent Systems
, pp. 37-44
-
-
Pita, J.1
Tambe, M.2
Kiekintveld, C.3
Cullen, S.4
Steigerwald, E.5
-
16
-
-
60149091834
-
Worst-case interdiction analysis of large-scale electric power grids
-
J. Salmeron, K. Wood, and R. Baldrick. Worst-case interdiction analysis of large-scale electric power grids. IEEE Transactions on Power Systems, 24(1): 96-104, 2009.
-
(2009)
IEEE Transactions on Power Systems
, vol.24
, Issue.1
, pp. 96-104
-
-
Salmeron, J.1
Wood, K.2
Baldrick, R.3
-
17
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing. Automated generation and analysis of attack graphs. In IEEE Symposium on Security and Privacy, pages 273-284, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
19
-
-
9444248634
-
Effective approaches for partial satisfaction (over-subscription) planning
-
Menkes van den Briel, Romeo Sanchez, Minh B. Do, and Subbarao Kambhampati. Effective approaches for partial satisfaction (over-subscription) planning. In Nineteenth National Conference on Artifical Intelligence, pages 562-569, 2004.
-
(2004)
Nineteenth National Conference on Artifical Intelligence
, pp. 562-569
-
-
Van Den Briel, M.1
Sanchez, R.2
Do, M.B.3
Kambhampati, S.4
-
21
-
-
85084161252
-
NetKuang - A multi-host configuration vulnerability checker
-
Dan Zerkle and Karl Levitt. NetKuang - A multi-host configuration vulnerability checker. In USENIX Unix Security Symposium, 1996.
-
(1996)
USENIX Unix Security Symposium
-
-
Zerkle, D.1
Levitt, K.2
-
22
-
-
70450092394
-
RRE: A game-theoretic intrusion response and recovery engine
-
Saman A. Zonouz, Himanshu Khurana, William H. Sanders, and Timothy M. Yardley. RRE: A game-theoretic intrusion response and recovery engine. In International Conference on Dependable Systems and Networks, pages 439-448, 2009.
-
(2009)
International Conference on Dependable Systems and Networks
, pp. 439-448
-
-
Zonouz, S.A.1
Khurana, H.2
Sanders, W.H.3
Yardley, T.M.4
|