default search action
Guide to Vulnerability Analysis for Computer Networks and Systems 2018
- Simon Parkinson, Andrew Crampton, Richard Hill:
Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. Computer Communications and Networks, Springer 2018, ISBN 978-3-319-92623-0
Introduction and State-of-the-art
- Saad Khan, Simon Parkinson:
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. 3-32 - Mark Stamp:
A Survey of Machine Learning Algorithms and Their Application in Information Security. 33-55
Vulnerability Assessment Frameworks
- Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf:
Vulnerability Assessment of Cyber Security for SCADA Systems. 59-80 - Alexandros Chrysikos, Stephen McGuire:
A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. 81-99 - Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko:
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. 101-130 - Steven Walker-Roberts, Mohammad Hammoudeh:
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications. 131-155
Applications of Artificial Intelligence
- Saad Khan, Simon Parkinson:
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study. 159-182 - Vivin Paliath, Paulo Shakarian:
Defending Against Chained Cyber-Attacks by Adversarial Agents. 183-209 - Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy:
Vulnerability Detection and Analysis in Adversarial Deep Learning. 211-234 - Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz:
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis. 235-258 - Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp:
Function Call Graphs Versus Machine Learning for Malware Detection. 259-279 - Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp:
Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. 281-299 - Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp:
Masquerade Detection on Mobile Devices. 301-315 - Liam Grant, Simon Parkinson:
Identifying File Interaction Patterns in Ransomware Behaviour. 317-335
Visualisation
- Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi:
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. 339-366 - Suvodeep Mazumdar, Jing Wang:
Big Data and Cyber Security: A Visual Analytics Perspective. 367-381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.