Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp.217-224, 2002. ,
Guided design of attack trees: a systembased approach, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp.61-75, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01871059
Course of action generation for cyber security using classical planning, ICAPS, pp.12-21, 2005. ,
Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs, IFIP Annual Conference on Data and Applications Security and Privacy, pp.330-348, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01954421
Knowledge acquisition and knowledge engineering in the modplan workbench, Proceedings of the First International Competition on Knowledge Engineering for AI, pp.26-33, 2005. ,
Sentiwordnet: A publicly available lexical resource for opinion mining, In: LREC, vol.6, pp.417-422, 2006. ,
A planner-based approach to generate and analyze minimal attack graph, Applied Intelligence, vol.36, issue.2, pp.369-390, 2012. ,
The metric-ff planning system: Translating"ignoring delete lists"to numeric state variables, Journal of Artificial Intelligence Research, vol.20, pp.291-341, 2003. ,
Val: Automatic plan validation, continuous effects and mixed initiative planning using pddl, Tools with Artificial Intelligence, 2004. ICTAI 2004. 16th IEEE International Conference on, pp.294-301, 2004. ,
Attack trees with sequential conjunction, IFIP International Information Security and Privacy Conference, pp.339-353, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01197256
Accurate unlexicalized parsing, Proceedings of the 41st Annual Meeting on Association for Computational Linguistics, vol.1, pp.423-430, 2003. ,
An annotated review of past papers on attack graphs, 2005. ,
A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security, pp.336-345, 2006. ,
Antlr: A predicated-ll (k) parser generator, Software: Practice and Experience, vol.25, issue.7, pp.789-810, 1995. ,
Inspect, edit and debug pddl documents: Simply and efficiently with pddl studio, System Demonstrations and Exhibits at ICAPS pp, pp.15-18, 2012. ,
Dynamic security risk management using bayesian attack graphs, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.1, pp.61-74, 2012. ,
Using attack trees to identify malicious attacks from authorized insiders, ESORICS, vol.3679, pp.231-246, 2005. ,
Using planning for a personalized security agent, Workshop on Problem Solving using Classical Planners at 26th AAAI Conf. on Artificial Intelligence, 2012. ,
Identifying critical attack assets in dependency attack graphs, European Symposium on Research in Computer Security, pp.18-34, 2008. ,
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002. ,
Security risk analysis of enterprise networks using probabilistic attack graphs, Network Security Metrics, pp.53-73, 2017. ,
Using bayesian networks for probabilistic identification of zero-day attack paths, IEEE Transactions on Information Forensics and Security, vol.13, issue.10, pp.2506-2521, 2018. ,
Enriching the knowledge sources used in a maximum entropy part-of-speech tagger, Proceedings of the 2000 Joint SIGDAT conference on Empirical methods in natural language processing and very large corpora: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics, vol.13, pp.63-70, 2000. ,
itsimple 2.0: An integrated tool for designing planning domains, ICAPS, pp.336-343, 2007. ,
A brief review of tools and methods for knowledge engineering for planning & scheduling, KEPS, p.7, 2011. ,
The itsimple tool for modeling planning domains, Proceedings of the First International Competition on Knowledge Engineering for AI Planning, 2005. ,
it-simple4. 0: Enhancing the modeling experience of planning problems, System Demonstration-Proceedings of the 22nd International Conference on Automated Planning & Scheduling (ICAPS-12), pp.11-14, 2012. ,
Measuring the overall security of network configurations using attack graphs, IFIP Annual Conference on Data and Applications Security and Privacy, pp.98-112, 2007. ,
Automated extraction of vulnerability information for home computer security, International Symposium on Foundations and Practice of Security, pp.356-366, 2014. ,