2014
DOI: 10.1007/978-3-319-11391-3_12
|View full text |Cite
|
Sign up to set email alerts
|

Attack Projection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(37 citation statements)
references
References 40 publications
0
36
0
1
Order By: Relevance
“…Wei and Jiang [7] in 2013 analyzed the problem of network security situation prediction and compared predictions of NSSA using neural networks, time series, and support vector machines, although mostly to illustrate the limitations of the available methods. Yang et al [3] formalized the task of attack projection and surveyed literature on the topic in 2014. Three categories are listed, prediction based on attack plans, estimates of attackers capabilities and intentions, and predictions by learning attack patterns and attacker's behavior.…”
Section: Existing Surveysmentioning
confidence: 99%
See 3 more Smart Citations
“…Wei and Jiang [7] in 2013 analyzed the problem of network security situation prediction and compared predictions of NSSA using neural networks, time series, and support vector machines, although mostly to illustrate the limitations of the available methods. Yang et al [3] formalized the task of attack projection and surveyed literature on the topic in 2014. Three categories are listed, prediction based on attack plans, estimates of attackers capabilities and intentions, and predictions by learning attack patterns and attacker's behavior.…”
Section: Existing Surveysmentioning
confidence: 99%
“…The tasks are summed up in Table I. Historically, the first such use cases are the attack projection [3] and the attack intention recognition [4], which are closely tied to intrusion detection. The task is to predict what is an attacker (in an already observed attack) going to do next, and what is attacker's ultimate goal [4].…”
Section: Use Cases Of Prediction and Forecasting In Cyber Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Метод оцінювання прогнозування часових рядів, що засновано на нейронних мережах, представлено у роботі [9].…”
Section: аналіз останніх публікацій і дослідженьunclassified