Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing

作者: Andrew Zawadowskiy , Jeffrey A. Kraemer

DOI:

关键词: Network securityKey (cryptography)Computer networkReal-time computingSecurity policyConjunction (grammar)Graphical modelProbabilistic logicComputer scienceEvent (computing)

摘要: A system defines at least one key event to be monitored by agent, and creates a graphical model for the event. The observes infers degree of attack on computer based an observation in conjunction with result effect has model. then adjusts security policy output

参考文章(81)