Login / Signup
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool.
Przemyslaw Buczkowski
Pasquale Malacaria
Chris Hankin
Andrew Fielder
Published in:
CoRR (2022)
Keyphrases
</>
control system
enterprise network
attack graph
critical infrastructure
attack graphs
dynamic programming
intrusion detection
security policies
optimal solution
cyber attacks
real time
security issues
optimal strategy
optimal control
control strategy
probabilistic model
information systems
neural network