A Bottom-Up Approach to Applying Graphical Models in Security Analysis.
Xinming OuPublished in: GraMSec@CSF (2016)
Keyphrases
- graphical models
- security analysis
- probabilistic model
- belief propagation
- random variables
- public key
- probabilistic graphical models
- approximate inference
- smart card
- probabilistic inference
- encryption scheme
- map inference
- security requirements
- structure learning
- markov networks
- conditional random fields
- bayesian networks
- conditional independence
- user authentication
- factor graphs
- statistical relational learning
- lightweight
- markov random field
- chain graphs