Autonomous agents modelling other agents: A comprehensive survey and open problems
Much research in artificial intelligence is concerned with the development of autonomous
agents that can interact effectively with other agents. An important aspect of such agents is …
agents that can interact effectively with other agents. An important aspect of such agents is …
Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
[BOOK][B] Plan, activity, and intent recognition: Theory and practice
Plan recognition, activity recognition, and intent recognition together combine and unify
techniques from user modeling, machine vision, intelligent user interfaces, human/computer …
techniques from user modeling, machine vision, intelligent user interfaces, human/computer …
A systematic survey on multi-step attack detection
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …
They have become more complex concurrently with computer networks. Nowadays …
Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …
Attack plan recognition and prediction using causal networks
X Qin, W Lee - 20th Annual Computer Security Applications …, 2004 - ieeexplore.ieee.org
Correlating and analyzing security alerts is a critical and challenging task in security
management. Recently, some techniques have been proposed for security alert correlation …
management. Recently, some techniques have been proposed for security alert correlation …
A probabilistic plan recognition algorithm based on plan tree grammars
We present the PHATT algorithm for plan recognition. Unlike previous approaches to plan
recognition, PHATT is based on a model of plan execution. We show that this clarifies …
recognition, PHATT is based on a model of plan execution. We show that this clarifies …
[BOOK][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
[HTML][HTML] Landmark-based approaches for goal recognition as planning
Recognizing goals and plans from complete or partial observations can be efficiently
achieved through automated planning techniques. In many applications, it is important to …
achieved through automated planning techniques. In many applications, it is important to …