2019 Winter Simulation Conference (WSC) 2019
DOI: 10.1109/wsc40007.2019.9004688
|View full text |Cite
|
Sign up to set email alerts
|

Simulation for Cyber Risk Management – Where are we, and Where do we Want to Go?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 53 publications
0
7
0
Order By: Relevance
“…We can conclude that acquiring any form of reliable access (either read or write) to the training data used to train (or re-train) the ML-model is not very realistic [31,54,84]. Some power on the training data is obtainable only if the NIDS and corresponding training set are entirely managed by the target organization.…”
Section: Training Datamentioning
confidence: 99%
See 4 more Smart Citations
“…We can conclude that acquiring any form of reliable access (either read or write) to the training data used to train (or re-train) the ML-model is not very realistic [31,54,84]. Some power on the training data is obtainable only if the NIDS and corresponding training set are entirely managed by the target organization.…”
Section: Training Datamentioning
confidence: 99%
“…The detection model represents the core component of the ML-NIDS, which is deployed on machines whose access requires high administrative privileges, and which can be contacted only by few selected devices [46]. Hence, it is unrealistic to assume that an infected host can allow the attacker to access the ML-NIDS containing its detection model [84,102].…”
Section: Detection Modelmentioning
confidence: 99%
See 3 more Smart Citations