cs.CR, cs.LG, cs.NI

Dynamic Risk Assessment by Bayesian Attack Graphs and Process Mining

arXiv:2604.18080v1 Announce Type: cross
Abstract: While attack graphs are useful for identifying major cybersecurity threats affecting a system, they do not provide operational support for determining the likelihood of having a known vulnerability exp…