作者: Andrew Zawadowskiy , Jeffrey A. Kraemer
DOI:
关键词: Network security 、 Key (cryptography) 、 Computer network 、 Real-time computing 、 Security policy 、 Conjunction (grammar) 、 Graphical model 、 Probabilistic logic 、 Computer science 、 Event (computing)
摘要: A system defines at least one key event to be monitored by agent, and creates a graphical model for the event. The observes infers degree of attack on computer based an observation in conjunction with result effect has model. then adjusts security policy output