Professional Documents
Culture Documents
Student Name
Student ID #1234567
INSE 6320 Course Project
Figure 5. Bayesian Network of the vulnerabilities found on the Figure 6. Influence diagram for our network
system
Table 3. Payoff table used to find the value for the optimistic
and conservative approach in the decision analysis
6. REFERENCES
[1] Ritchey, R.W et al, Using model checking to analyze
network vulnerabilities, Security and Privacy, 2000.
Proceedings., 2000 IEEE Symposium on, p. 156 - 165, 2000