Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers.
Wolter PietersMohsen DavarynejadPublished in: DPM/SETOP/QASA (2014)
Keyphrases
- malicious attacks
- control system
- bayesian networks
- control strategy
- high risk
- control method
- risk management
- data sets
- decision making
- probabilistic model
- decision trees
- adaptive control
- information systems
- control theory
- ddos attacks
- privacy preserving
- information theoretic
- robotic systems
- risk measures
- neural network