A Model-based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable Networks.
Ali AlshawishKorbinian SpielvogelHermann de MeerPublished in: NetSys (2019)
Keyphrases
- intrusion detection
- security risks
- least squares
- security issues
- security level
- social networks
- security problems
- human body
- network structure
- computer security
- information security
- computer networks
- security requirements
- network design
- security protocols
- network security
- access control
- trade off
- network analysis
- importance sampling
- cyber security
- security mechanisms
- statistical databases
- security policies
- maximum a posteriori
- complex networks
- maximum likelihood
- information systems