2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) 2014
DOI: 10.1109/iccke.2014.6993444
|View full text |Cite
|
Sign up to set email alerts
|

Network security risk mitigation using Bayesian decision networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Augessy et al 30 proposed an approach to model ongoing and possible future attacks. Khosravi-Farhad et al 31,32 proposed the use of the Bayesian decision networks to measure the impact of vulnerabilities and to find minimum-cost security measures.…”
Section: Attack Graphs and Bayesian Network In Cybersecuritymentioning
confidence: 99%
“…Augessy et al 30 proposed an approach to model ongoing and possible future attacks. Khosravi-Farhad et al 31,32 proposed the use of the Bayesian decision networks to measure the impact of vulnerabilities and to find minimum-cost security measures.…”
Section: Attack Graphs and Bayesian Network In Cybersecuritymentioning
confidence: 99%
“…In literature [46], Bayesian decision network is proposed to yield scalability, and integrate the risk assessment and outcome. The premise of using this model is to generate Bayesian attack graph of the network at first.…”
Section: The Nodes In the First Slice Of A 2tbn Do Not Have Any Parammentioning
confidence: 99%
“…Bayesian Decision Network [46]: This model represents a decision network which combines a Bayesian network with additional node types for actions and utilities. Bayesian decision network contains three types of nodes.…”
Section: The Nodes In the First Slice Of A 2tbn Do Not Have Any Parammentioning
confidence: 99%
“…Peltola and Kekolahti [30] use Bayesian networks and expert knowledge to perform a risk assessment of the Finnish TETRA PSS network, where several risk sources and controls affect the availability of the network. Bayesian networks have been also used in several research papers to model interdependent information security vulnerabilities as attack scenarios [13][14][15]17]. Sommestad et al [16] present a framework for analysing cyber security using Bayesian statistics and Mo et al [12] propose a quantitative model for evaluating a firm's cyber security readiness by use of Bayesian networks.…”
Section: Bayesian Networkmentioning
confidence: 99%