An attack graph based procedure for risk estimation of zero-day attacks.
Marjan KeramatiPublished in: IST (2016)
Keyphrases
- risk management
- detection mechanism
- decision making
- decision support system
- estimation algorithm
- accurate estimation
- robust estimation
- minimum risk
- high risk
- secret key
- countermeasures
- graph model
- parameter estimation
- neural network
- risk factors
- real time
- graph theoretic
- expected utility
- risk assessment
- label propagation
- information systems