2019 18th IEEE International Conference on Machine Learning and Applications (ICMLA) 2019
DOI: 10.1109/icmla.2019.00219
|View full text |Cite
|
Sign up to set email alerts
|

Causal Discovery of Cyber Attack Phases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Most of the time, causality methods are more promising. Mueller, Memory, and Bartrem [40] use causal discovery techniques to discover cyber kill-chains; therefore, data is presented as a Causal Bayesian Network (CBN). Finding the right methodology to explain the experiment's outcome is also part of the development of the CPS-VA and will start as soon as first datasets are ready.…”
Section: Post-run Analysis Methodologymentioning
confidence: 99%
“…Most of the time, causality methods are more promising. Mueller, Memory, and Bartrem [40] use causal discovery techniques to discover cyber kill-chains; therefore, data is presented as a Causal Bayesian Network (CBN). Finding the right methodology to explain the experiment's outcome is also part of the development of the CPS-VA and will start as soon as first datasets are ready.…”
Section: Post-run Analysis Methodologymentioning
confidence: 99%