


default search action
Guide to Vulnerability Analysis for Computer Networks and Systems 2018
- Simon Parkinson

, Andrew Crampton
, Richard Hill
:
Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. Computer Communications and Networks, Springer 2018, ISBN 978-3-319-92623-0
Introduction and State-of-the-art
- Saad Khan

, Simon Parkinson
:
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. 3-32 - Mark Stamp:

A Survey of Machine Learning Algorithms and Their Application in Information Security. 33-55
Vulnerability Assessment Frameworks
- Kyle Coffey, Leandros A. Maglaras, Richard Smith, Helge Janicke, Mohamed Amine Ferrag

, Abdelouahid Derhab, Mithun Mukherjee, Stylianos Rallis, Awais Yousaf:
Vulnerability Assessment of Cyber Security for SCADA Systems. 59-80 - Alexandros Chrysikos, Stephen McGuire

:
A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. 81-99 - Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko:

AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. 101-130 - Steven Walker-Roberts, Mohammad Hammoudeh:

Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications. 131-155
Applications of Artificial Intelligence
- Saad Khan

, Simon Parkinson
:
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study. 159-182 - Vivin Paliath, Paulo Shakarian:

Defending Against Chained Cyber-Attacks by Adversarial Agents. 183-209 - Yi Shi, Yalin E. Sagduyu

, Kemal Davaslioglu
, Renato Levy:
Vulnerability Detection and Analysis in Adversarial Deep Learning. 211-234 - Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz:

SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis. 235-258 - Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp:

Function Call Graphs Versus Machine Learning for Malware Detection. 259-279 - Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp:

Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. 281-299 - Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp:

Masquerade Detection on Mobile Devices. 301-315 - Liam Grant, Simon Parkinson

:
Identifying File Interaction Patterns in Ransomware Behaviour. 317-335
Visualisation
- Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi:

A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. 339-366 - Suvodeep Mazumdar, Jing Wang:

Big Data and Cyber Security: A Visual Analytics Perspective. 367-381

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














