2009
DOI: 10.1007/978-1-4419-0140-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Methods for High Level Cyber Situation Awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…e weight analysis method is the most commonly used evaluation method, and its evaluation function is usually an exponential expression, which is determined by the situation factor and its importance weight [50]. e authors of [15] adopted a bottom-up, partial first, and overall strategy to establish a hierarchical network security threat situation quantitative assessment model.…”
Section: Weight Analysis Methodmentioning
confidence: 99%
See 1 more Smart Citation
“…e weight analysis method is the most commonly used evaluation method, and its evaluation function is usually an exponential expression, which is determined by the situation factor and its importance weight [50]. e authors of [15] adopted a bottom-up, partial first, and overall strategy to establish a hierarchical network security threat situation quantitative assessment model.…”
Section: Weight Analysis Methodmentioning
confidence: 99%
“…e key is to obtain the importance weight of the situation factor. It is the most prominent advantage, i.e., the result of level-1 fusion is directly used as the parameter of the situation assessment function, which narrows the distance between the data fusion levels [50].…”
Section: Weight Analysis Methodmentioning
confidence: 99%
“…They employed deep learning approach to correlate malicious activities obtained from the DNS protocol usage. Dietterich et al [38] used machine learning methods to capture the behavior of ordinary desktop computer users.…”
Section: B Using Artificial Intelligencementioning
confidence: 99%
“…The TaskTracer system (Dietterich et al, 2010;Shen et al, 2007) was developed to support multi-tasking and interruption recovery for desktop users. The system tries to infer the user's current working project using desktop events (e.g., ''Open Document'', ''New Folder'') in combination with machine learning algorithms.…”
Section: State Of the Artmentioning
confidence: 99%
“…Intelligent notification systems need to identify task boundaries in order to lower the cost of interrupting users (Bailey and Iqbal, 2008). Efficient task monitoring is also required to provide intelligent assistance and resources (Dietterich et al, 2010;Horvitz et al, 1998).…”
Section: Introductionmentioning
confidence: 99%