-
1
-
-
0038289826
-
Kuang: Rule based security checking
-
Technical report, MIT Lab for Computer Science, Programming Systems Research Group, May
-
R. Baldwin. Kuang: Rule based security checking. Technical report, MIT Lab for Computer Science, Programming Systems Research Group, May 1994.
-
(1994)
-
-
Baldwin, R.1
-
2
-
-
0037952337
-
-
Computer Oracle and Password System (COPS)
-
Computer Oracle and Password System (COPS). ftp.cert.org/pub/tools/cops.
-
-
-
-
4
-
-
0038289843
-
-
Network associates: CyberCop Scanner
-
Network associates: CyberCop Scanner. www.nai.com/asp_set/products/tns/ccscanner_intro.asp.
-
-
-
-
5
-
-
2542607810
-
Quantitive assessment of operational security models and tools
-
Technical Report Research Report 96493, LAAS, May
-
M. Dacier, Y. Deswartes, and M. Kaaniche. Quantitive assessment of operational security models and tools. Technical Report Research Report 96493, LAAS, May 1996.
-
(1996)
-
-
Dacier, M.1
Deswartes, Y.2
Kaaniche, M.3
-
6
-
-
20444475398
-
Modeling network attacks: Extending the attack tree paradigm
-
Center for Informaion Security, University of Tulsa
-
J. Dawkins, C. Campbell, and J. Hale. Modeling network attacks: Extending the attack tree paradigm. In Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University, June 2002. Center for Informaion Security, University of Tulsa.
-
Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University, June 2002
-
-
Dawkins, J.1
Campbell, C.2
Hale, J.3
-
7
-
-
0038628539
-
Minimization and reliability analysis of attack graphs
-
Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February
-
S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February 2002.
-
(2002)
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
8
-
-
84948760464
-
Two formal analyses of attack graphs
-
Nova Scotia, June
-
S. Jha, O. Sheyner, and J. Wing. Two formal analyses of attack graphs. In Proceedings of the 2002 Computer Security Foundations Workshop, pages 45-59, Nova Scotia, June 2002.
-
(2002)
Proceedings of the 2002 Computer Security Foundations Workshop
, pp. 45-59
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
9
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
September/October
-
R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Transactions on Software Engineering, 25(5): 633-650, September/October 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
13
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (Oakland 2002), Oakland. CA, May 2002.
-
Proceedings of the 2002 IEEE Symposium on Security and Privacy (Oakland 2002), Oakland. CA, May 2002
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
14
-
-
84964504906
-
Computer-attack graph generation tool
-
June
-
L. Swiler, C. Phillips, D. Ellis, and S. Chakerian. Computer-attack graph generation tool. In Proceedings DISCEX '01: DARPA Information Survivability Conference & Exposition II, pages 307-321, June 2001.
-
(2001)
Proceedings DISCEX '01: DARPA Information Survivability Conference & Exposition II
, pp. 307-321
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
15
-
-
0038628540
-
-
Internet security systems: System Scanner
-
Internet security systems: System Scanner. www.iss.net.
-
-
-
|