G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network.
Peng LuTeng HuHao WangRuobin ZhangGuo WuPublished in: Secur. Commun. Networks (2021)
Keyphrases
- greedy algorithm
- critical infrastructure
- cyber attacks
- cyber security
- information security
- cyber defense
- greedy algorithms
- risk analysis
- smart grid
- control system
- worst case
- homeland security
- objective function
- access control
- data acquisition
- intrusion detection
- greedy strategy
- security policies
- influence maximization
- dynamic programming
- network management
- emergency management
- network security
- real time
- network structure
- security issues
- risk management
- anomaly detection
- optimal solution
- viral marketing
- complex networks