Computing Optimal Security Strategies for Interdependent Assets.
Joshua LetchfordYevgeniy VorobeychikPublished in: UAI (2012)
Keyphrases
- optimal strategy
- intrusion detection
- dynamic programming
- efficient computation
- objective function
- access control
- network security
- statistical databases
- information assurance
- neural network
- security properties
- cyber security
- security requirements
- optimal design
- security issues
- security policies
- information security
- closed form
- distributed systems
- sensor networks