This paper deals with computational aspects of attack trees, more precisely, evaluating the expected adversarial utility in the failure-free game, where the adversary is allowed to re-run failed atomic attacks an unlimited number of times. It has been shown by Buldas and Lenin that exact evaluation of this utility is an NP-complete problem, so a computationally feasible approximation is needed. In this paper we consider a genetic approach for this challenge. Since genetic algorithms depend on a number of non-trivial parameters, we face a multi-objective optimization problem and we consider several heuristic criteria to solve it
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Genetic algorithms (GAs) are a class of optimization algorithms. GAs attempt to solve problems throu...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
This paper deals with computational aspects of attack trees, more precisely, evaluating the expected...
We present a new fully adaptive computational model for attack trees that allows attackers to repeat...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Attack-defence trees are a promising approach for representing threat scenarios and possible counter...
Attack-defence trees are a promising approach for representing threat scenarios and possible counter...
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi...
Part 2: 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIH...
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm usin...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm usin...
Conference ICAI’05 Problems of incomplete information include a component of unknown information. We...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Genetic algorithms (GAs) are a class of optimization algorithms. GAs attempt to solve problems throu...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
This paper deals with computational aspects of attack trees, more precisely, evaluating the expected...
We present a new fully adaptive computational model for attack trees that allows attackers to repeat...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Attack-defence trees are a promising approach for representing threat scenarios and possible counter...
Attack-defence trees are a promising approach for representing threat scenarios and possible counter...
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi...
Part 2: 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIH...
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm usin...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm usin...
Conference ICAI’05 Problems of incomplete information include a component of unknown information. We...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Genetic algorithms (GAs) are a class of optimization algorithms. GAs attempt to solve problems throu...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...