Using Bayesian networks for cyber security analysis.
Peng XieJason H. LiXinming OuPeng LiuRenato LevyPublished in: DSN (2010)
Keyphrases
- security analysis
- bayesian networks
- public key
- smart card
- security requirements
- high security
- security model
- image encryption
- security properties
- mutual authentication
- authentication protocol
- encryption scheme
- cyber security
- user authentication
- encryption algorithm
- security mechanisms
- private key
- real time
- authentication scheme
- information security