The complexity of cyber attacks in a new layered-security model and the maximum-weight, rooted-subtree problem.
Geir AgnarssonRaymond GreenlawSanpawat KantabutraPublished in: CoRR (2015)
Keyphrases
- security model
- maximum weight
- cyber attacks
- partial order
- access control
- security requirements
- public key
- security analysis
- minimum weight
- security policies
- bipartite graph
- cyber security
- np hard
- knowledge discovery
- security mechanisms
- countermeasures
- critical infrastructure
- real time
- intrusion detection
- database systems
- databases