Yunchuan Guo

Learn More
Cyber attacks prediction is an important part of risk management. Existing cyber attacks prediction methods did not fully consider the specific environment factors of the target network, which may make the results deviate from the true situation. In this paper, we propose a cyber attacks prediction model based on Bayesian network. We use attack graphs to(More)
This paper presents an efficient modeling technique for the derivation of the dispersion characteristics of novel uniplanar metallodielectric periodic structures. The analysis is based on the method of moments and an interpolation scheme, which significantly accelerates the computations. Triangular basis functions are used that allow for modeling of(More)
Quantifying the improper leakage of confidential information is a great challenge. In this paper, we propose a method to quantify the information leakage for a fully probabilistic system. Our approach relies on αmutual information (αMI). In our analysis, system is modeled as a fully probabilistic automata; information leakage is identified by(More)
Integrity is one of essential properties of information security. It is necessary to analyze integrity of system quantitatively in order to protect the system security. For the purpose, we present formal definitions of integrity based on probabilistic computation tree logic (PCTL) and quantitative evaluation model of integrity. In the model, we model(More)
Formal approaches have been used traditionally to verify whether systems fulfill certain property especially in the field of model checking. However, those formal specifications are strongly biased by the underlying verification model instead of representing the intuitive concepts. And few people researches on relations between different properties. In this(More)