Semantical considerations on nonmonotonic logic
Artificial Intelligence
Proceedings of the first international conference on Principles of knowledge representation and reasoning
Artificial Intelligence
The Pleadings Game: an exercise in computational dialectics
Artificial Intelligence and Law
CYC: a large-scale investment in knowledge infrastructure
Communications of the ACM
Reaching agreements through argumentation: a logical model and implementation
Artificial Intelligence
A logic-based theory of deductive arguments
Artificial Intelligence
A Reasoning Model Based on the Production of Acceptable Arguments
Annals of Mathematics and Artificial Intelligence
Games That Agents Play: A Formal Framework for Dialogues between Autonomous Agents
Journal of Logic, Language and Information
Argumentation based decision making for autonomous agents
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Probabilistic argumentation systems a new way to combine logic with probability
Journal of Applied Logic - Special issue on combining probability and logic
Argumentation-based negotiation
The Knowledge Engineering Review
Polygraph: Automatically Generating Signatures for Polymorphic Worms
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
A distributed host-based worm detection system
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Automated adaptive intrusion containment in systems of interacting services
Computer Networks: The International Journal of Computer and Telecommunications Networking
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Autograph: toward automated, distributed worm signature detection
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
An application of formal argumentation: Fusing Bayesian networks in multi-agent systems
Artificial Intelligence
The Carneades model of argument and burden of proof
Artificial Intelligence
Argument diagramming in logic, law and artificial intelligence
The Knowledge Engineering Review
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Automated Security Configuration Management
Journal of Network and Systems Management
Argumentation: planning other agents' plans
IJCAI'89 Proceedings of the 11th international joint conference on Artificial intelligence - Volume 1
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04
Weighted argument systems: Basic definitions, algorithms, and complexity results
Artificial Intelligence
Risk agoras: dialectical argumentation for scientific reasoning
UAI'00 Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence
On the acceptability of arguments in preference-based argumentation
UAI'98 Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence
High speed and robust event correlation
IEEE Communications Magazine
A move in the security measurement stalemate: elo-style ratings to quantify vulnerability
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
We present our preliminary work in using argumentation logics to reason about security administration tasks. Decisionsabout network security are increasingly complex, involvingtradeoffs between keeping systems secure, maintaining system operation, escalating costs, and compromising functionality. In this paper we suggest the use of argumentation to provide automated support for security decisions. Argumentation is a formal approach to decision making that has proved to be effective in a number of domains. In contrast to traditional first order logic, argumentation logic provides the basis for presenting arguments to a user for or against a position, along with well-founded methods for assessing the outcome of interactions among the arguments. We demonstrate the use of argumentation in a reconfiguration problem, to diagnose the root cause of cyber-attack, and to set policies.