On ordered weighted averaging aggregation operators in multicriteria decisionmaking
IEEE Transactions on Systems, Man and Cybernetics
Fuzzy Sets and Systems
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
The ordered weighted averaging operators: theory and applications
The ordered weighted averaging operators: theory and applications
A modified OWA operator and its use in lossless DPCM image compression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Building secure software: how to avoid security problems the right way
Building secure software: how to avoid security problems the right way
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Fuzzy logic methods in recommender systems
Fuzzy Sets and Systems - Theme: Multicriteria decision
Fuzzy Sets and Systems - Special issue: Preference modelling and applications
Attack scenario graphs for computer network threat analysis and prediction
Complexity - Special issue: Resilient and adaptive defense of computing networks
Extending multicriteria decision making by mixing t-norms and OWA operators: Research Articles
International Journal of Intelligent Systems
An Introduction to Copulas
Induced ordered weighted averaging operators
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Finding an internal state of RC4 stream cipher
Information Sciences: an International Journal
On a family of multivariate copulas for aggregation processes
Information Sciences: an International Journal
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Improving minimax disparity model to determine the OWA operator weights
Information Sciences: an International Journal
Parametric aggregation in ordered weighted averaging
International Journal of Approximate Reasoning
Technical Communication: Attribution of attack trees
Computers and Electrical Engineering
Computational aspects of attack---defense trees
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
International Journal of Intelligent Systems
Attribute Decoration of Attack-Defense Trees
International Journal of Secure Software Engineering
Quantitative questions on attack: defense trees
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.07 |
We introduce the idea of an OWA node as an extension of the ''and/or'' node and use them to generalize ''and/or'' trees to OWA trees. We provide a semantics for an OWA node. Specifically while an ''or'' node requires only one of the children to be satisfied and an ''and'' node requires ''all'' the children be satisfied the OWA node allows us to model situations in which there is some probabilistic uncertainty in the number of children that need be satisfied. We then use these OWA nodes in the security related problem of constructing attack trees. Techniques for the evaluation of an OWA attack tree for the overall probability of success and cost of an attack are provided. A method is provided for describing different types of attackers.