Academic literature on the topic 'Dynamic attack graph'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dynamic attack graph.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Dynamic attack graph"
Pasupuleti, Murali Krishna. "Graph-Theoretical Intelligence for Adaptive Cybersecurity: Multi-Modal Models, Dynamic Defense, and Federated Threat Detection." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 347–56. https://doi.org/10.62311/nesx/rp3125.
Full textLi, Haoyang, Shimin Di, Calvin Hong Yi Li, Lei Chen, and Xiaofang Zhou. "Fight Fire with Fire: Towards Robust Graph Neural Networks on Dynamic Graphs via Actively Defense." Proceedings of the VLDB Endowment 17, no. 8 (2024): 2050–63. http://dx.doi.org/10.14778/3659437.3659457.
Full textLi, Jiate, Meng Pang, and Binghui Wang. "Practicable Black-Box Evasion Attacks on Link Prediction in Dynamic Graphs—a Graph Sequential Embedding Method." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 25 (2025): 26265–72. https://doi.org/10.1609/aaai.v39i25.34824.
Full textJaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Full textMangesh Pujari. "Edge AI-Powered Cyber-Physical Attack Mitigation: A Graph Reinforcement Learning Approach for Autonomous Threat Response." Journal of Information Systems Engineering and Management 10, no. 44s (2025): 953–66. https://doi.org/10.52783/jisem.v10i44s.8692.
Full textPal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Full textRajeshwari, T., and C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks." Asian Journal of Computer Science and Technology 8, S1 (2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Full textSæther, Sigve Hortemo, Jan Arne Telle, and Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming." Journal of Artificial Intelligence Research 54 (September 9, 2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Full textCerotti, Davide, Daniele Codetta Raiteri, Giovanna Dondossola, et al. "SecuriDN: A Modeling Tool Supporting the Early Detection of Cyberattacks to Smart Energy Systems." Energies 17, no. 16 (2024): 3882. http://dx.doi.org/10.3390/en17163882.
Full textHu, Chenao, and Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game." IOP Conference Series: Materials Science and Engineering 790 (April 7, 2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Full textDissertations / Theses on the topic "Dynamic attack graph"
Hamid, Thaier K. A. "Attack graph approach to dynamic network vulnerability analysis and countermeasures." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/576432.
Full textBoudermine, Antoine. "A dynamic attack graphs based approach for impact assessment of vulnerabilities in complex computer systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT046.
Full textAguessy, François-Xavier. "Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0016/document.
Full textAguessy, François-Xavier. "Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0016.
Full textSaman, Nariman Goran. "A Framework for Secure Structural Adaptation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658.
Full textMensah, Pernelle. "Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0011.
Full textKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Full textBook chapters on the topic "Dynamic attack graph"
Grammatikakis, Konstantinos-Panagiotis, and Nicholas Kolokotronis. "Attack Graph Generation." In Cyber-Security Threats, Actors, and Dynamic Mitigation. CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-8.
Full textZheng, Dongyang, Chengliang Gao, Jiaxu Xing, Ximing Chen, Rongrong Chen, and Jing Qiu. "Dynamic Analysis of Attack Paths Based on Bayesian Attack Graph." In Communications in Computer and Information Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4506-0_4.
Full textGain, Ayan, and Mridul Sankar Barik. "Attack Graph Based Security Metrics for Dynamic Networks." In Information Systems Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49099-6_7.
Full textWang, Haiping, Binbin Li, Tianning Zang, et al. "Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph." In Science of Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45933-7_14.
Full textXia, Hui, Yanan Jiang, Mingda Ma, Rui Zhang, and Yang You. "Topological Vulnerability-Based Imperceptible Node Injection Attack Against Dynamic Graph Neural Network." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-1093-8_45.
Full textHusák, Martin, Joseph Khoury, Đorđe Klisura, and Elias Bou-Harb. "On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics." In Complex Computational Ecosystems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44355-8_12.
Full textChen, Xihui, Ema Këpuska, Sjouke Mauw, and Yunior Ramírez-Cruz. "Active Re-identification Attacks on Periodically Released Dynamic Social Graphs." In Computer Security – ESORICS 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59013-0_10.
Full textWang, Dongqi, Ruiguo Hu, Dongming Chen, Zeyu Lv, and Jie Wang. "Guarding Graph Neural Networks Against Backdoor Attacks-A Training Loss Dynamics Approach." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-95-0006-2_21.
Full textMakhijani, Jagdish, Yashwant Pathak, and Soumya Bajpai. "AI-Enhanced Attack Graphs Using Markov Decision Processes for Proactive Threat Hunting and Risk Forecasting." In Artificial Intelligence in Cybersecurity for Risk Assessment and Transparent Threat Detection Frameworks. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552029-04.
Full textXu, Hongcai, and Junpeng Bao. "Dynamic Knowledge Graph-Based Dialogue Generation with Improved Adversarial Meta-Learning." In Artificial Intelligence and Human-Computer Interaction. IOS Press, 2024. http://dx.doi.org/10.3233/faia240132.
Full textConference papers on the topic "Dynamic attack graph"
Chen, Xinhao, Houding Zhang, Dongying Gao, Jie Fu, Zhilei Lv, and Zheng Li. "Research on Dynamic Anomaly Detection Method of Edge Devices Based on Attack Chain Knowledge Graph." In 2025 IEEE 8th Information Technology and Mechatronics Engineering Conference (ITOEC). IEEE, 2025. https://doi.org/10.1109/itoec63606.2025.10968854.
Full textYang, Wei, Fangyuan Hou, Zhuoyue Jia, et al. "A Dynamic Risk Assessment Method for Industrial Control Network Security Based on Bayesian Attack Graph." In 2025 5th International Conference on Computer, Control and Robotics (ICCCR). IEEE, 2025. https://doi.org/10.1109/icccr65461.2025.11072640.
Full textTan, Mengmi, Jianyi Liu, and Ru Zhang. "DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00314.
Full textSatpathy, Utkalika, Harsh Borse, and Sandip Chakraborty. "Towards Generating a Robust, Scalable and Dynamic Provenance Graph for Attack Investigation over Distributed Microservice Architecture." In 2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS). IEEE, 2025. https://doi.org/10.1109/comsnets63942.2025.10885639.
Full textJiang, Mingsi, Mi Wen, Yun Xiong, and Weiwei Li. "An Approach for APT Attack Scenario Construction Based on Dynamic Attack Graphs." In GLOBECOM 2024 - 2024 IEEE Global Communications Conference. IEEE, 2024. https://doi.org/10.1109/globecom52923.2024.10901487.
Full textNgo, Huy Q., Mingyu Guo, and Hung Nguyen. "Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs." In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. IEEE, 2024. http://dx.doi.org/10.1109/infocom52122.2024.10621210.
Full textHe, Siying, Mi Wen, Xiumin Li, and Zhou Su. "An Approach for Attack Scenario Construction Based on Dynamic Attack Path Graph." In 2023 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2023. http://dx.doi.org/10.1109/iccc57788.2023.10233417.
Full textAlrehaili, Meaad, and Adel Alshamrani. "An Attack Scenario Reconstruction Approach Using Alerts Correlation and a Dynamic Attack Graph." In 2023 Eighth International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2023. http://dx.doi.org/10.1109/mobisecserv58080.2023.10329144.
Full textBoudermine, Antoine, Rida Khatoun, and Jean-Henri Choyer. "Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment." In 2022 5th Conference on Cloud and Internet of Things (CIoT). IEEE, 2022. http://dx.doi.org/10.1109/ciot53061.2022.9766588.
Full textWu, Hua, Yu Gu, Guang Cheng, and Yuyang Zhou. "Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph." In CSSE 2020: 2020 3rd International Conference on Computer Science and Software Engineering. ACM, 2020. http://dx.doi.org/10.1145/3403746.3403897.
Full text