Evaluation of complex security scenarios using defense trees and economic indexes.
Stefano BistarelliFabio FioravantiPamela PerettiFrancesco SantiniPublished in: J. Exp. Theor. Artif. Intell. (2012)
Keyphrases
- intrusion detection
- network security
- real world
- information security
- database
- evaluation method
- access control
- security issues
- b tree
- cyber defense
- attack scenarios
- key management
- security requirements
- computer networks
- intrusion detection system
- electronic commerce
- anomaly detection
- distributed systems
- data structure
- high level
- decision trees