Provenance-aware security risk analysis for hosts and network flows.
Mohsen RezvaniAleksandar IgnjatovicElisa BertinoSanjay K. JhaPublished in: NOMS (2014)
Keyphrases
- risk analysis
- network flow
- information security
- risk management
- risk assessment
- linear programming
- decision making
- integer programming
- critical infrastructure
- risk factors
- minimum cost
- optimization model
- influence diagrams
- data mining
- bipartite graph
- network security
- fuzzy numbers
- network traffic
- knowledge management
- fuzzy logic
- state space
- np hard
- case study
- databases