Advances, Systems and Applications
From: A new method of dynamic network security analysis based on dynamic uncertain causality graph
Node | Causal Chain Expression | Posterior Probability |
---|---|---|
V1 | - | 1 |
S2 | 1/4*(A2;1,1 + A4,1;2 + A3,1;2 + 1/4*A5;2A8;5A13,1;5) | 0.473 |
V5 | 1/2*(A2;1,1A5,2 + 1/4*A8;5A13,1;8) | 0.197 |
V3 | - | 1 |
V4 | - | 1 |
S4 | - | 1 |
S5 | 1/3*(A5;4 + 1/2*A7;5A6;7A11,1;6 + 1/4*A8;5A7;8A12;7A8;12A13;8 + 1/4*A10;5A8;10A13,1;8) | 0.4126 |
V6 | - | 1 |
V7 | 1/2*(A5;4A7;5 + 1/2*A11,1;6A6;7) | 0.369 |
V8 | 1/2*(A5;4A8;5 + 1/4*A13,1;8A8;12A12;7A7;8) | 0.2755 |
V10 | 1/2*(A5;4A10;5 + 1/4*A8;10A13,1;8) | 0.2125 |
S6 | 1/3*(1/2*A5;4A7;5A6;7 + 1/2*A6,6 + A11,1;6) | 0.5396 |
S7 | 1/2*(A5;4A8;5 A7;8+ 1/4*A13,1;8A8;12A12;7) | 0.2755 |
V11 | - | 1 |
V12 | 1/2*(A5;4A8;5A7;8A12;7 + 1/4*A13,1;8A8;12) | 0.2755 |
S8 | 1/4*(A13,1;8 + 1/4*(A2;1,1A5,2A8;5 + A8;11 + A5;4A8;5A7;8A12;7A8;12 + A5;4A10;5A8;10) | 3512 |
V13 | - | 1 |
S9 | - | 1 |