You mean attack graph is used to assessment the IDS? right. I have go through many paper including transactions. Nobody mentioned attack graph. Anyway to validate an IDS model confusion matrix, ROC curve, and F1 measure is used. there is also some other parameters are there. Please refer my publications and tell me if i am wrong.
If you found any literature regarding attack graph then feel free to send me . i update my knowledge and will be thankful to you.
Hello all, I am trying to simulate false data injection attacks in control systems by yilin mo and bruno sinupoli. In that paper i didnt understand how to calculate the attack vector for a control system . Can any one of you help ? Thank You