Bayesian Network Models in Cyber Security: A Systematic Review

Conference object English OPEN
Chockalingam, S.; Pieters, W.; Herdeiro Teixeira, A.M.; van Gelder, P.H.A.J.M.; Lipmaa, Helger; Mitrokotsa, Aikaterini; Matulevicius, Raimundas;
  • Publisher: Springer
  • Subject: Bayesian Network | Bayesian attack graph | Cyber security | Information security | Insider threat

Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive compar... View more
  • References (54)
    54 references, page 1 of 6

    1. WEF: Partnering for Cyber Resilience: Towards the Quanti cation of Cyber Threats. (2015)

    2. Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE network 29, 83-87. (2015)

    3. Ben-Gal, I.: Bayesian Networks. Encyclopedia of Statistics in Quality and Reliability. John Wiley & Sons, Ltd. (2008)

    4. Darwiche, A.: Bayesian networks. Foundations of Arti cial Intelligence 3. (2008)

    5. Landuyt, D., et al.: A review of Bayesian belief networks in ecosystem service modelling. Environmental Modelling & Software 46, 1-11. (2013)

    6. Uusitalo, L.: Advantages and challenges of Bayesian networks in environmental modelling. Ecological modelling 203, 312-318. (2007)

    7. Nikovski, D.: Constructing Bayesian Networks for Medical Diagnosis from Incomplete and Partially Correct Statistics. IEEE Transactions on Knowledge and Data Engineering 12(4), pp.509-516. (2000)

    8. Nakatsu, R.T.: Reasoning with Diagrams: Decision-Making and Problem-Solving with Diagrams. John Wiley & Sons. (2009)

    9. Phan, T.D., et al.: Applications of Bayesian belief networks in water resource management: A systematic review. Environmental Modelling & Software 85, 98-111. (2016)

    10. Kordy, B., Pietre-Cambacedes, L., Schweitzer, P.: DAG-based attack and defense modeling: Don't miss the forest for the attack trees. Computer science review 13, 1-38. (2014)

  • Metrics
Share - Bookmark

  • Download from
    TU Delft Repository via NARCIS (Conference object, 2017)
  • Cite this publication