2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) 2019
DOI: 10.1109/smc.2019.8913864
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Intelligent Cybersecurity with Bayesian Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…e KR method can be divided into logical reasoning based on production rules, reasoning based on graph models, and probabilistic reasoning based on evidence theory. Different methods include fuzzy reasoning, Bayesian networks, Markov processes, and the DS evidence theory [15,16]. e KR method can simulate the way of human thinking compared with the MM method.…”
Section: Knowledge Reasoning-based Methodmentioning
confidence: 99%
See 3 more Smart Citations
“…e KR method can be divided into logical reasoning based on production rules, reasoning based on graph models, and probabilistic reasoning based on evidence theory. Different methods include fuzzy reasoning, Bayesian networks, Markov processes, and the DS evidence theory [15,16]. e KR method can simulate the way of human thinking compared with the MM method.…”
Section: Knowledge Reasoning-based Methodmentioning
confidence: 99%
“…Some studies use heuristic algorithms to improve high efficiency. In addition, as the classification knowledge is obtained from historical data through machine learning, it is difficult for the machine to give an intuitive explanation, which is not conducive to understanding [16].…”
Section: Knowledge Reasoning-based Methodmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, the complexity of cyber security has been more and more dominated by approaches borrowed from Artificial Intelligence (AI) to promote automation. In this paper [49] Researchers provide a short survey and hints on Bayesian cyber security applications to allow quantitative threat assessment for higher risk analysis and situational awareness.…”
Section: Prevention Of Cyber-attacks and Threats Using Aimentioning
confidence: 99%