메뉴 건너뛰기




Volumn , Issue , 2003, Pages 605-614

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities

Author keywords

Data analysis; Finite state machine modeling; Security vulnerabilities

Indexed keywords

FINITE STATE MACHINE (FSM) MODEL; SECURITY VULNERABILITIES;

EID: 1542359967     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (32)

References (21)
  • 1
    • 0003400251 scopus 로고
    • Secure computer systems: A mathematical model
    • Mitre Corporation, Bedford, MA, May
    • D. E. Bell and L. LaPadula. Secure computer systems: A mathematical model Technical report MTR-2547 Vol II. Mitre Corporation, Bedford, MA, May 1973.
    • (1973) Technical Report , vol.2 MTR-2547
    • Bell, D.E.1    LaPadula, L.2
  • 3
    • 0025211594 scopus 로고
    • Specifying and Modeling of Computer Security
    • Jan.
    • John McLean. Specifying and Modeling of Computer Security. IEEE Computer 23(1) pp. 9-16. Jan. 1989.
    • (1989) IEEE Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 5
    • 0003487594 scopus 로고    scopus 로고
    • A Critical Analysis of Vulnerability Taxonomies
    • Department of Computer Science, University of California at Davis (Sep.)
    • M. Bishop and D. Bailey, A Critical Analysis of Vulnerability Taxonomies, Technical Report 96-11, Department of Computer Science, University of California at Davis (Sep. 1996).
    • (1996) Technical Report , vol.96 , Issue.11
    • Bishop, M.1    Bailey, D.2
  • 8
    • 0028514027 scopus 로고
    • A Taxonomy of Computer Program Security Flaws, with Examples
    • Sep
    • C. Landwehr, A. Bull, J. McDermott, W. Choi, A Taxonomy of Computer Program Security Flaws, with Examples, ACM Computing Surveys 26, no. 3 (Sep 1994).
    • (1994) ACM Computing Surveys , vol.26 , Issue.3
    • Landwehr, C.1    Bull, A.2    McDermott, J.3    Choi, W.4
  • 13
    • 84862051915 scopus 로고    scopus 로고
    • http://www.securityfocus.com
  • 14
    • 84862046143 scopus 로고    scopus 로고
    • http://www.cert.org
  • 17
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
    • Sept.
    • R. Ortalo, Y. Deswarte and M. Kaaniche, Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Transactions on Software Engineering, vol. 25, no. 5, pp.633-650, Sept. 1999
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 19
    • 84882800335 scopus 로고    scopus 로고
    • Simple, state-based approaches to program-based anomaly detection
    • Aug.
    • C. Michael, A. Ghosh. Simple, state-based approaches to program-based anomaly detection. ACM Transactions on Information and System Security. Pages: 203-237. Vol.5 No.3. Aug. 2002
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.3 , pp. 203-237
    • Michael, C.1    Ghosh, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.