Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
dc.contributor.author | Khouzani, MHR | en_US |
dc.contributor.author | Liu, Z | en_US |
dc.contributor.author | Malacaria, P | en_US |
dc.date.accessioned | 2019-06-07T09:42:52Z | |
dc.date.available | 2019-04-23 | en_US |
dc.date.issued | 2019-11-01 | en_US |
dc.identifier.issn | 0377-2217 | en_US |
dc.identifier.uri | https://qmro.qmul.ac.uk/xmlui/handle/123456789/57877 | |
dc.format.extent | 894 - 903 | en_US |
dc.relation.ispartof | EUROPEAN JOURNAL OF OPERATIONAL RESEARCH | en_US |
dc.rights | This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. | |
dc.rights | Attribution 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by/3.0/us/ | * |
dc.subject | Computing science | en_US |
dc.subject | Multi-objective optimisation | en_US |
dc.subject | Cyber-security | en_US |
dc.subject | Probabilistic attack graph | en_US |
dc.title | Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs | en_US |
dc.type | Article | |
dc.rights.holder | © 2019 The Authors. | |
dc.identifier.doi | 10.1016/j.ejor.2019.04.035 | en_US |
pubs.author-url | http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000472690900013&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=612ae0d773dcbdba3046f6df545e9f6a | en_US |
pubs.issue | 3 | en_US |
pubs.notes | Not known | en_US |
pubs.publication-status | Published | en_US |
pubs.volume | 278 | en_US |
rioxxterms.funder | Default funder | en_US |
rioxxterms.identifier.project | Default project | en_US |
qmul.funder | Customized and Adaptive approach for Optimal Cybersecurity Investment::Engineering and Physical Sciences Research Council | en_US |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
Except where otherwise noted, this item's license is described as This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.