2013
DOI: 10.1007/978-3-319-01159-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Formulating Cyber-Security as Convex Optimization Problems

Abstract: Abstract. Mission-centric cyber-security analysts require a complete overview and understanding of the state of a mission and any potential threats to their completion. To facilitate this, we propose optimizationbased algorithms that can be used to predict in real-time how an attacker may try to compromise a cyber-mission with a limited amount of resources, based on a model that takes into account potential damage to the mission and probabilistic uncertainty. Two different optimization schemes are considered: … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…infectious diseases) [76] and social networks [10], [65], human/robot interaction systems [41], Internet [26], transportation systems [45], cyber-security (e.g. malware spreading) [2], [33], [70], [73], [82], [83], unmanned aerial/underwater vehicles [30], sensor networks [63], power networks [80] and mobile robotics [69]. Those systems are large, complex, dynamic, and highly nonlinear in their global behavior.…”
mentioning
confidence: 99%
“…infectious diseases) [76] and social networks [10], [65], human/robot interaction systems [41], Internet [26], transportation systems [45], cyber-security (e.g. malware spreading) [2], [33], [70], [73], [82], [83], unmanned aerial/underwater vehicles [30], sensor networks [63], power networks [80] and mobile robotics [69]. Those systems are large, complex, dynamic, and highly nonlinear in their global behavior.…”
mentioning
confidence: 99%