A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
2012
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)
Constraints such as limited security investment cost precludes a security decision maker from implementing all possible countermeasures in a system. Existing analytical model-based security optimization strategies do not prevail for the following reasons: (i) none of these model-based methods offer a way to find optimal security solution in the absence of probability assignments to the model, (ii) methods scale badly as size of the system to model increases and (iii) some methods suffer as they
doi:10.1109/dsn.2012.6263940
dblp:conf/dsn/RoyKT12
fatcat:d5nl7c2pcrgo3j7werxg3xr5za