Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency.
Mohsen RezvaniAleksandar IgnjatovicSanjay K. JhaPublished in: DCOSS (2013)
Keyphrases
- risk analysis
- network flow
- information security
- risk assessment
- risk management
- decision making
- risk factors
- minimum cost
- linear programming
- integer programming
- critical infrastructure
- fuzzy numbers
- optimization model
- metadata
- influence diagrams
- neural network
- network security
- decision support system
- decision makers
- e government
- rough sets
- computational complexity
- case study