Sciweavers

1365 search results - page 77 / 273
» Maximal Causality Analysis
Sort
View
ACSAC
2004
IEEE
15 years 4 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
DEBS
2008
ACM
15 years 2 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
EMS
2008
IEEE
15 years 2 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
100
Voted
ICA
2010
Springer
15 years 1 months ago
Use of Prior Knowledge in a Non-Gaussian Method for Learning Linear Structural Equation Models
Abstract. We discuss causal structure learning based on linear structural equation models. Conventional learning methods most often assume Gaussianity and create many indistinguish...
Takanori Inazumi, Shohei Shimizu, Takashi Washio
94
Voted
EOR
2006
76views more  EOR 2006»
15 years 23 days ago
Regional development assessment: A structural equation approach
We propose a multivariate statistical framework for regional development assessment based on structural equation modelling with latent variables and show how such methods can be c...
Dario Cziráky, Joze Sambt, Joze Rovan, Jaks...