Autonomous agents modelling other agents: A comprehensive survey and open problems

SV Albrecht, P Stone - Artificial Intelligence, 2018 - Elsevier
Much research in artificial intelligence is concerned with the development of autonomous
agents that can interact effectively with other agents. An important aspect of such agents is …

Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

[BOOK][B] Plan, activity, and intent recognition: Theory and practice

G Sukthankar, C Geib, HH Bui, D Pynadath… - 2014 - books.google.com
Plan recognition, activity recognition, and intent recognition together combine and unify
techniques from user modeling, machine vision, intelligent user interfaces, human/computer …

A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey

H Albasheer, M Md Siraj, A Mubarakali… - Sensors, 2022 - mdpi.com
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …

Attack plan recognition and prediction using causal networks

X Qin, W Lee - 20th Annual Computer Security Applications …, 2004 - ieeexplore.ieee.org
Correlating and analyzing security alerts is a critical and challenging task in security
management. Recently, some techniques have been proposed for security alert correlation …

A probabilistic plan recognition algorithm based on plan tree grammars

CW Geib, RP Goldman - Artificial Intelligence, 2009 - Elsevier
We present the PHATT algorithm for plan recognition. Unlike previous approaches to plan
recognition, PHATT is based on a model of plan execution. We show that this clarifies …

[BOOK][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

[HTML][HTML] Landmark-based approaches for goal recognition as planning

RF Pereira, N Oren, F Meneguzzi - Artificial Intelligence, 2020 - Elsevier
Recognizing goals and plans from complete or partial observations can be efficiently
achieved through automated planning techniques. In many applications, it is important to …