메뉴 건너뛰기




Volumn , Issue , 2002, Pages 217-224

Scalable, graph-based network vulnerability analysis

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; ELECTRONIC COMMERCE; JAVA PROGRAMMING LANGUAGE; POLYNOMIALS; SECURITY OF DATA; TREES (MATHEMATICS);

EID: 0038687692     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/586110.586140     Document Type: Conference Paper
Times cited : (748)

References (17)
  • 1
    • 0038289826 scopus 로고
    • Kuang: Rule based security checking
    • Technical report, MIT Lab for Computer Science, Programming Systems Research Group, May
    • R. Baldwin. Kuang: Rule based security checking. Technical report, MIT Lab for Computer Science, Programming Systems Research Group, May 1994.
    • (1994)
    • Baldwin, R.1
  • 2
    • 0037952337 scopus 로고    scopus 로고
    • Computer Oracle and Password System (COPS)
    • Computer Oracle and Password System (COPS). ftp.cert.org/pub/tools/cops.
  • 4
    • 0038289843 scopus 로고    scopus 로고
    • Network associates: CyberCop Scanner
    • Network associates: CyberCop Scanner. www.nai.com/asp_set/products/tns/ccscanner_intro.asp.
  • 5
    • 2542607810 scopus 로고    scopus 로고
    • Quantitive assessment of operational security models and tools
    • Technical Report Research Report 96493, LAAS, May
    • M. Dacier, Y. Deswartes, and M. Kaaniche. Quantitive assessment of operational security models and tools. Technical Report Research Report 96493, LAAS, May 1996.
    • (1996)
    • Dacier, M.1    Deswartes, Y.2    Kaaniche, M.3
  • 7
    • 0038628539 scopus 로고    scopus 로고
    • Minimization and reliability analysis of attack graphs
    • Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February
    • S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February 2002.
    • (2002)
    • Jha, S.1    Sheyner, O.2    Wing, J.3
  • 9
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • September/October
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Transactions on Software Engineering, 25(5): 633-650, September/October 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 15
    • 0038628540 scopus 로고    scopus 로고
    • Internet security systems: System Scanner
    • Internet security systems: System Scanner. www.iss.net.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.