Literatura académica sobre el tema "Dynamic attack graph"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Dynamic attack graph".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Dynamic attack graph"
Pasupuleti, Murali Krishna. "Graph-Theoretical Intelligence for Adaptive Cybersecurity: Multi-Modal Models, Dynamic Defense, and Federated Threat Detection." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 347–56. https://doi.org/10.62311/nesx/rp3125.
Texto completoLi, Haoyang, Shimin Di, Calvin Hong Yi Li, Lei Chen, and Xiaofang Zhou. "Fight Fire with Fire: Towards Robust Graph Neural Networks on Dynamic Graphs via Actively Defense." Proceedings of the VLDB Endowment 17, no. 8 (2024): 2050–63. http://dx.doi.org/10.14778/3659437.3659457.
Texto completoLi, Jiate, Meng Pang, and Binghui Wang. "Practicable Black-Box Evasion Attacks on Link Prediction in Dynamic Graphs—a Graph Sequential Embedding Method." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 25 (2025): 26265–72. https://doi.org/10.1609/aaai.v39i25.34824.
Texto completoJaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completoMangesh Pujari. "Edge AI-Powered Cyber-Physical Attack Mitigation: A Graph Reinforcement Learning Approach for Autonomous Threat Response." Journal of Information Systems Engineering and Management 10, no. 44s (2025): 953–66. https://doi.org/10.52783/jisem.v10i44s.8692.
Texto completoPal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Texto completoRajeshwari, T., and C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks." Asian Journal of Computer Science and Technology 8, S1 (2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Texto completoSæther, Sigve Hortemo, Jan Arne Telle, and Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming." Journal of Artificial Intelligence Research 54 (September 9, 2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Texto completoCerotti, Davide, Daniele Codetta Raiteri, Giovanna Dondossola, et al. "SecuriDN: A Modeling Tool Supporting the Early Detection of Cyberattacks to Smart Energy Systems." Energies 17, no. 16 (2024): 3882. http://dx.doi.org/10.3390/en17163882.
Texto completoHu, Chenao, and Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game." IOP Conference Series: Materials Science and Engineering 790 (April 7, 2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Texto completoTesis sobre el tema "Dynamic attack graph"
Hamid, Thaier K. A. "Attack graph approach to dynamic network vulnerability analysis and countermeasures." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/576432.
Texto completoBoudermine, Antoine. "A dynamic attack graphs based approach for impact assessment of vulnerabilities in complex computer systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT046.
Texto completoAguessy, François-Xavier. "Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0016/document.
Texto completoAguessy, François-Xavier. "Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0016.
Texto completoSaman, Nariman Goran. "A Framework for Secure Structural Adaptation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658.
Texto completoMensah, Pernelle. "Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0011.
Texto completoKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Texto completoCapítulos de libros sobre el tema "Dynamic attack graph"
Grammatikakis, Konstantinos-Panagiotis, and Nicholas Kolokotronis. "Attack Graph Generation." In Cyber-Security Threats, Actors, and Dynamic Mitigation. CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-8.
Texto completoZheng, Dongyang, Chengliang Gao, Jiaxu Xing, Ximing Chen, Rongrong Chen, and Jing Qiu. "Dynamic Analysis of Attack Paths Based on Bayesian Attack Graph." In Communications in Computer and Information Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4506-0_4.
Texto completoGain, Ayan, and Mridul Sankar Barik. "Attack Graph Based Security Metrics for Dynamic Networks." In Information Systems Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49099-6_7.
Texto completoWang, Haiping, Binbin Li, Tianning Zang, et al. "Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph." In Science of Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45933-7_14.
Texto completoXia, Hui, Yanan Jiang, Mingda Ma, Rui Zhang, and Yang You. "Topological Vulnerability-Based Imperceptible Node Injection Attack Against Dynamic Graph Neural Network." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-1093-8_45.
Texto completoHusák, Martin, Joseph Khoury, Đorđe Klisura, and Elias Bou-Harb. "On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics." In Complex Computational Ecosystems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44355-8_12.
Texto completoChen, Xihui, Ema Këpuska, Sjouke Mauw, and Yunior Ramírez-Cruz. "Active Re-identification Attacks on Periodically Released Dynamic Social Graphs." In Computer Security – ESORICS 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59013-0_10.
Texto completoWang, Dongqi, Ruiguo Hu, Dongming Chen, Zeyu Lv, and Jie Wang. "Guarding Graph Neural Networks Against Backdoor Attacks-A Training Loss Dynamics Approach." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-95-0006-2_21.
Texto completoMakhijani, Jagdish, Yashwant Pathak, and Soumya Bajpai. "AI-Enhanced Attack Graphs Using Markov Decision Processes for Proactive Threat Hunting and Risk Forecasting." In Artificial Intelligence in Cybersecurity for Risk Assessment and Transparent Threat Detection Frameworks. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552029-04.
Texto completoXu, Hongcai, and Junpeng Bao. "Dynamic Knowledge Graph-Based Dialogue Generation with Improved Adversarial Meta-Learning." In Artificial Intelligence and Human-Computer Interaction. IOS Press, 2024. http://dx.doi.org/10.3233/faia240132.
Texto completoActas de conferencias sobre el tema "Dynamic attack graph"
Chen, Xinhao, Houding Zhang, Dongying Gao, Jie Fu, Zhilei Lv, and Zheng Li. "Research on Dynamic Anomaly Detection Method of Edge Devices Based on Attack Chain Knowledge Graph." In 2025 IEEE 8th Information Technology and Mechatronics Engineering Conference (ITOEC). IEEE, 2025. https://doi.org/10.1109/itoec63606.2025.10968854.
Texto completoYang, Wei, Fangyuan Hou, Zhuoyue Jia, et al. "A Dynamic Risk Assessment Method for Industrial Control Network Security Based on Bayesian Attack Graph." In 2025 5th International Conference on Computer, Control and Robotics (ICCCR). IEEE, 2025. https://doi.org/10.1109/icccr65461.2025.11072640.
Texto completoTan, Mengmi, Jianyi Liu, and Ru Zhang. "DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00314.
Texto completoSatpathy, Utkalika, Harsh Borse, and Sandip Chakraborty. "Towards Generating a Robust, Scalable and Dynamic Provenance Graph for Attack Investigation over Distributed Microservice Architecture." In 2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS). IEEE, 2025. https://doi.org/10.1109/comsnets63942.2025.10885639.
Texto completoJiang, Mingsi, Mi Wen, Yun Xiong, and Weiwei Li. "An Approach for APT Attack Scenario Construction Based on Dynamic Attack Graphs." In GLOBECOM 2024 - 2024 IEEE Global Communications Conference. IEEE, 2024. https://doi.org/10.1109/globecom52923.2024.10901487.
Texto completoNgo, Huy Q., Mingyu Guo, and Hung Nguyen. "Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs." In IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. IEEE, 2024. http://dx.doi.org/10.1109/infocom52122.2024.10621210.
Texto completoHe, Siying, Mi Wen, Xiumin Li, and Zhou Su. "An Approach for Attack Scenario Construction Based on Dynamic Attack Path Graph." In 2023 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2023. http://dx.doi.org/10.1109/iccc57788.2023.10233417.
Texto completoAlrehaili, Meaad, and Adel Alshamrani. "An Attack Scenario Reconstruction Approach Using Alerts Correlation and a Dynamic Attack Graph." In 2023 Eighth International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2023. http://dx.doi.org/10.1109/mobisecserv58080.2023.10329144.
Texto completoBoudermine, Antoine, Rida Khatoun, and Jean-Henri Choyer. "Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment." In 2022 5th Conference on Cloud and Internet of Things (CIoT). IEEE, 2022. http://dx.doi.org/10.1109/ciot53061.2022.9766588.
Texto completoWu, Hua, Yu Gu, Guang Cheng, and Yuyang Zhou. "Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph." In CSSE 2020: 2020 3rd International Conference on Computer Science and Software Engineering. ACM, 2020. http://dx.doi.org/10.1145/3403746.3403897.
Texto completo