This paper addresses how to identify attack relations on the basis of lay arguers’ acceptability-judgments for natural language arguments. We characterize argument-based reasoning by three Bayesian network models (coherent, decisive, and positional). Each model yields a different attack relation-estimate. Subsequently, we analyze to which extent estimates are consistent with, and so could potentially predict, lay arguers’ acceptability-judgments. Evaluation of a model’s predictive ability relies on anonymous data collected online (N = 73). After applying leave-one-out cross-validation, in the best case models achieve an average area under the receiver operating curve (AUC) of.879 and an accuracy of.786. Though the number of arguments is sma...
The appeal to expert opinion is an argument form that uses the verdict of an expert to support a pos...
The growing need to find proper countermeasures able to protect critical infrastructures from threat...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...
The web is a source of a large amount of arguments and their acceptability statuses (e.g., votes for...
Errors in reasoning about probabilistic evidence can have severe consequences. In the legal domain a...
Abstract. Qualitative and quantitative systems to deal with uncer-tainty coexist. Bayesian networks ...
Over the last decades the rise of forensic sciences has led to an increase in the availability of st...
Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities ...
Over the last decades the rise of forensic sciences has led to an increase in the availability of st...
Qualitative and quantitative systems to deal with uncertainty coexist. Bayesian networks are a well ...
Over the last decades the rise of forensic sciences has led to an increase in the availability of st...
In the real world it is common for agents to posit arguments concerning an issue but not directly sp...
Attack graphs provide compact representations of the attack paths an attacker can follow to compromi...
In legal reasoning the Bayesian network approach has gained increasingly more attention over the las...
The appeal to expert opinion is an argument form that uses the verdict of an expert to support a pos...
The appeal to expert opinion is an argument form that uses the verdict of an expert to support a pos...
The growing need to find proper countermeasures able to protect critical infrastructures from threat...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...
The web is a source of a large amount of arguments and their acceptability statuses (e.g., votes for...
Errors in reasoning about probabilistic evidence can have severe consequences. In the legal domain a...
Abstract. Qualitative and quantitative systems to deal with uncer-tainty coexist. Bayesian networks ...
Over the last decades the rise of forensic sciences has led to an increase in the availability of st...
Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities ...
Over the last decades the rise of forensic sciences has led to an increase in the availability of st...
Qualitative and quantitative systems to deal with uncertainty coexist. Bayesian networks are a well ...
Over the last decades the rise of forensic sciences has led to an increase in the availability of st...
In the real world it is common for agents to posit arguments concerning an issue but not directly sp...
Attack graphs provide compact representations of the attack paths an attacker can follow to compromi...
In legal reasoning the Bayesian network approach has gained increasingly more attention over the las...
The appeal to expert opinion is an argument form that uses the verdict of an expert to support a pos...
The appeal to expert opinion is an argument form that uses the verdict of an expert to support a pos...
The growing need to find proper countermeasures able to protect critical infrastructures from threat...
AbstractThe growing need to find proper countermeasures able to protect critical infrastructures fro...