Evaluating practitioner cyber-security attack graph configuration preferences.
Harjinder Singh LallieKurt DebattistaJay BalPublished in: Comput. Secur. (2018)
Keyphrases
- cyber security
- attack graph
- network configuration
- attack graphs
- smart grid
- intrusion detection
- cyber attacks
- critical infrastructure
- security issues
- intrusion detection system
- decision making
- network security
- planning horizon
- neural network
- real time
- visual analytics
- distributed databases
- power system
- decision support system
- computational intelligence
- social networks