Author:
Musman Scott,Booker Lashon
Publisher
Springer International Publishing
Reference59 articles.
1. Ammann, P., Wijesekera, D., & Kaushik, S. (2002, November). Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM conference on computer and communications security (pp. 217–224).
2. Amos-Binks, A., Clark, J., Weston, K., Winters, M., & Harfoush, K. (2017, July). Efficient attack plan recognition using automated planning. In 2017 IEEE symposium on computers and communications (ISCC) (pp. 1001–1006). IEEE.
3. Applebaum, A., Miller, D., Strom, B., Korban, C., & Wolf, R. (2016, December). Intelligent, automated red team emulation. In Proceedings of the 32nd annual conference on computer security applications (pp. 363–373).
4. Bai, A., Srivastava, S., & Russell, S. J. (2016). Markovian state and action abstractions for MDPs via hierarchical MCTS. In Proceedings of the twenty-fifth international joint conference on artificial intelligence (pp. 3029–3039).
5. Coast Technical Report 98/05;JS Ballasubramaniyan,1998