DOI: 10.1007/978-3-540-87403-4_15
|View full text |Cite
|
Sign up to set email alerts
|

Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 29 publications
(39 citation statements)
references
References 15 publications
0
39
0
Order By: Relevance
“…BN captures the characteristic in real-world data of locality of influence, the idea that most variables are influenced by only a few others. [7] shows the implications of this. Bayesian networks combine graph theory with statistical techniques to model MSA scenarios.…”
Section: Probabilistic Reasoning Enginementioning
confidence: 92%
See 4 more Smart Citations
“…BN captures the characteristic in real-world data of locality of influence, the idea that most variables are influenced by only a few others. [7] shows the implications of this. Bayesian networks combine graph theory with statistical techniques to model MSA scenarios.…”
Section: Probabilistic Reasoning Enginementioning
confidence: 92%
“…Bayesian networks have been used for intrusion detection, examples include [7] and [5]. [7] models the potential attacks to a target network using a Bayesian network to determine (off-line) a set of detectors to protect the network.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations